Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare

被引:194
作者
Mozaffari-Kermani, Mehran [1 ]
Sur-Kolay, Susmita [2 ]
Raghunathan, Anand [3 ]
Jha, Niraj K. [4 ]
机构
[1] Rochester Inst Technol, Dept Elect & Microelect Engn, Rochester, NY 14623 USA
[2] Indian Stat Inst, Adv Comp & Microelect Unit, Kolkata 700108, India
[3] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[4] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Healthcare; machine learning; poisoning attacks; security; CLASSIFICATION; SECURITY; RULES;
D O I
10.1109/JBHI.2014.2344095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors ( incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.
引用
收藏
页码:1893 / 1905
页数:13
相关论文
共 50 条
[41]   Deep learning model inversion attacks and defenses: a comprehensive survey [J].
Yang, Wencheng ;
Wang, Song ;
Wu, Di ;
Cai, Taotao ;
Zhu, Yanming ;
Wei, Shicheng ;
Zhang, Yiying ;
Yang, Xu ;
Tang, Zhaohui ;
Li, Yan .
ARTIFICIAL INTELLIGENCE REVIEW, 2025, 58 (08)
[42]   Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods [J].
Wu, Mingtao ;
Song, Zhengyi ;
Moon, Young B. .
JOURNAL OF INTELLIGENT MANUFACTURING, 2019, 30 (03) :1111-1123
[43]   Multi-Source Cyber-Attacks Detection using Machine Learning [J].
Taheri, Sona ;
Gondal, Iqbal ;
Bagirov, Adil ;
Harkness, Greg ;
Brown, Simon ;
Chi, CHihung .
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, :1167-1172
[44]   A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization [J].
Chao, Daichong ;
Xu, Dawei ;
Gao, Feng ;
Zhang, Chuan ;
Zhang, Weiting ;
Zhu, Liehuang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03) :1775-1829
[45]   Machine learning-based intrusion detection for SCADA systems in healthcare [J].
Ozturk, Tolgahan ;
Turgut, Zeynep ;
Akgun, Gokce ;
Kose, Cemal .
NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2022, 11 (01)
[46]   An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records [J].
Seh, Adil Hussain ;
Al-Amri, Jehad F. ;
Subahi, Ahmad F. ;
Agrawal, Alka ;
Pathak, Nitish ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 130 (03) :1387-1422
[47]   A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications [J].
Bharadwaj, Hemantha Krishna ;
Agarwal, Aayush ;
Chamola, Vinay ;
Lakkaniga, Naga Rajiv ;
Hassija, Vikas ;
Guizani, Mohsen ;
Sikdar, Biplab .
IEEE ACCESS, 2021, 9 :38859-38890
[48]   Protecting machine learning from poisoning attacks: A risk-based approach [J].
Bena, Nicola ;
Anisetti, Marco ;
Damiani, Ernesto ;
Yeun, Chan Yeob ;
Ardagna, Claudio A. .
COMPUTERS & SECURITY, 2025, 155
[49]   Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy [J].
Song, Shaorui ;
Xu, Lei ;
Zhu, Liehuang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :5506-5521
[50]   Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection [J].
Dong, Fangming ;
Wang, Pinghui ;
Li, Rundong ;
Cui, Xueyao ;
Zhao, Junzhou ;
Tao, Jing ;
Zhang, Chen ;
Guan, Xiaohong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (04) :3275-3288