Machine Learning Security: Threats, Countermeasures, and Evaluations

被引:102
作者
Xue, Mingfu [1 ]
Yuan, Chengxiang [1 ]
Wu, Heyi [2 ]
Zhang, Yushu [1 ]
Liu, Weiqiang [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Upsec Network Secur Technol Res Inst Co L, Nanjing 211100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
基金
中国国家自然科学基金;
关键词
Machine learning; Security; Data models; Machine learning algorithms; Training; Training data; Prediction algorithms; Artificial intelligence security; poisoning attacks; backdoor attacks; adversarial examples; privacy-preserving machine learning; POISONING ATTACKS; DEFENSES;
D O I
10.1109/ACCESS.2020.2987435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nature of the deep learning models. In this survey, we systematically analyze the security issues of machine learning, focusing on existing attacks on machine learning systems, corresponding defenses or secure learning techniques, and security evaluation methods. Instead of focusing on one stage or one type of attack, this paper covers all the aspects of machine learning security from the training phase to the test phase. First, the machine learning model in the presence of adversaries is presented, and the reasons why machine learning can be attacked are analyzed. Then, the machine learning security-related issues are classified into five categories: training set poisoning; backdoors in the training set; adversarial example attacks; model theft; recovery of sensitive training data. The threat models, attack approaches, and defense techniques are analyzed systematically. To demonstrate that these threats are real concerns in the physical world, we also reviewed the attacks in real-world conditions. Several suggestions on security evaluations of machine learning systems are also provided. Last, future directions for machine learning security are also presented.
引用
收藏
页码:74720 / 74742
页数:23
相关论文
共 50 条
[31]   An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools [J].
Hu, Wei ;
Chang, Chip-Hong ;
Sengupta, Anirban ;
Bhunia, Swarup ;
Kastner, Ryan ;
Li, Hai .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) :1010-1038
[32]   A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View [J].
Liu, Qiang ;
Li, Pan ;
Zhao, Wentao ;
Cai, Wei ;
Yu, Shui ;
Leung, Victor C. M. .
IEEE ACCESS, 2018, 6 :12103-12117
[33]   A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats [J].
Alsalman, Dheyaaldin .
IEEE ACCESS, 2024, 12 :14719-14730
[34]   Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS [J].
Olowononi, Felix O. ;
Rawat, Danda B. ;
Liu, Chunmei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01) :524-552
[35]   Machine Learning for Cloud Security: A Systematic Review [J].
Nassif, Ali Bou ;
Abu Talib, Manar ;
Nasir, Qassim ;
Albadani, Halah ;
Dakalbab, Fatima Mohamad .
IEEE ACCESS, 2021, 9 :20717-20735
[36]   Survey on 5G Physical Layer Security Threats and Countermeasures [J].
Harvanek, Michal ;
Bolcek, Jan ;
Kufa, Jan ;
Polak, Ladislav ;
Simka, Marek ;
Marsalek, Roman .
SENSORS, 2024, 24 (17)
[37]   Machine Learning Attacks and Countermeasures for PUF-Based IoT Edge Node Security [J].
Laguduva V.R. ;
Katkoori S. ;
Karam R. .
SN Computer Science, 2020, 1 (5)
[38]   Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning [J].
Mughaid, Ala ;
Obeidat, Ibrahim ;
Shdaifat, Andaleeb ;
Alhayjna, Razan ;
AlZu'bi, Shadi .
2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, :123-127
[39]   Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges [J].
Chen, Huaming ;
Babar, M. Ali .
ACM COMPUTING SURVEYS, 2024, 56 (06)
[40]   Blockchain and Machine Learning in EHR Security: A Systematic Review [J].
Zukaib, Umer ;
Cui, Xiaohui ;
Hassan, Mir ;
Harris, Sheetal ;
Hadi, Hassan Jalil ;
Zheng, Chengliang .
IEEE ACCESS, 2023, 11 :130230-130256