Machine Learning Security: Threats, Countermeasures, and Evaluations

被引:102
作者
Xue, Mingfu [1 ]
Yuan, Chengxiang [1 ]
Wu, Heyi [2 ]
Zhang, Yushu [1 ]
Liu, Weiqiang [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Upsec Network Secur Technol Res Inst Co L, Nanjing 211100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Machine learning; Security; Data models; Machine learning algorithms; Training; Training data; Prediction algorithms; Artificial intelligence security; poisoning attacks; backdoor attacks; adversarial examples; privacy-preserving machine learning; POISONING ATTACKS; DEFENSES;
D O I
10.1109/ACCESS.2020.2987435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nature of the deep learning models. In this survey, we systematically analyze the security issues of machine learning, focusing on existing attacks on machine learning systems, corresponding defenses or secure learning techniques, and security evaluation methods. Instead of focusing on one stage or one type of attack, this paper covers all the aspects of machine learning security from the training phase to the test phase. First, the machine learning model in the presence of adversaries is presented, and the reasons why machine learning can be attacked are analyzed. Then, the machine learning security-related issues are classified into five categories: training set poisoning; backdoors in the training set; adversarial example attacks; model theft; recovery of sensitive training data. The threat models, attack approaches, and defense techniques are analyzed systematically. To demonstrate that these threats are real concerns in the physical world, we also reviewed the attacks in real-world conditions. Several suggestions on security evaluations of machine learning systems are also provided. Last, future directions for machine learning security are also presented.
引用
收藏
页码:74720 / 74742
页数:23
相关论文
共 50 条
[21]   A Survey of Edge Computing Privacy and Security Threats and their Countermeasures [J].
Shafee, Ahmed ;
Awaad, Tasneem A. ;
Moro, Ahmed .
2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, :484-489
[22]   Security in Software-Defined Networking: Threats and Countermeasures [J].
Zhaogang Shu ;
Jiafu Wan ;
Di Li ;
Jiaxiang Lin ;
Athanasios V. Vasilakos ;
Muhammad Imran .
Mobile Networks and Applications, 2016, 21 :764-776
[23]   A survey on security and privacy threats to federated learning [J].
Zhang, Junpeng ;
Li, Mengqian ;
Zeng, Shuiguang ;
Xie, Bin ;
Zhao, Dongmei .
2021 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA, 2021, :319-326
[24]   Detection of Android Malware Using Machine Learning and Siamese Shot Learning Technique for Security [J].
Almarshad, Fahdah A. ;
Zakariah, Mohammed ;
Gashgari, Ghada Abdalaziz ;
Aldakheel, Eman Abdullah ;
Alzahrani, Abdullah I. A. .
IEEE ACCESS, 2023, 11 :127697-127714
[25]   A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures [J].
Swessi, Dorsaf ;
Idoudi, Hanen .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) :1557-1592
[26]   Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures [J].
Islam, Shama Naz ;
Baig, Zubair ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6522-6530
[27]   Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures [J].
Krichen, Moez ;
Adoni, Wilfried Yves Hamilton ;
Mihoub, Alaeddine ;
Alzahrani, Mohammed Y. ;
Nahhal, Tarik .
2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, :184-189
[28]   Security threats and countermeasures in military 5G systems [J].
Sliwa, Joanna ;
Suchanski, Marek .
2022 24TH INTERNATIONAL MICROWAVE AND RADAR CONFERENCE (MIKON), 2022,
[29]   Navigating IoT Security: Architectures, Emerging Threats, and Adaptive Countermeasures [J].
Kandah, Farah ;
Mendis, Thilina ;
Medury, Lalith ;
Sherawat, Hemant ;
Wang, Haofan .
IEEE ACCESS, 2025, 13 :98888-98908
[30]   A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures [J].
Dorsaf Swessi ;
Hanen Idoudi .
Wireless Personal Communications, 2022, 124 :1557-1592