Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

被引:13
|
作者
Macas, Mayra [1 ,2 ]
Wu, Chunming [1 ]
Fuertes, Walter
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, 38 Zheda Rd, Hangzhou 310027, Peoples R China
[2] Univ Fuerzas Armadas ESPE, Dept Comp Sci, Av Gen Ruminahui S-N,POB 17-15-231B, Sangolqui 171103, Ecuador
关键词
Cybersecurity; Deep learning; Adversarial machine learning; Cyber threats; Adversarial examples; CYBER-PHYSICAL SYSTEMS; OF-THE-ART; MALWARE; NETWORK; INTERNET; REPRESENTATIONS; CLASSIFICATION; CLASSIFIERS; CHALLENGES; FRAMEWORK;
D O I
10.1016/j.eswa.2023.122223
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the last few years, the adoption of machine learning in a wide range of domains has been remarkable. Deep learning, in particular, has been extensively used to drive applications and services in specializations such as computer vision, natural language processing, machine translation, and cybersecurity, producing results that are comparable to or even surpass the performance of human experts. Nevertheless, machine learning systems are vulnerable to adversarial attacks, especially in nonstationary environments where actual adversaries exist, such as the cybersecurity domain. In this work, we comprehensively survey and present the latest research on attacks based on adversarial examples against deep learning-based cybersecurity systems, highlighting the risks they pose and promoting efficient countermeasures. To that end, adversarial attack methods are first categorized according to where they occur and the attacker's goals and capabilities. Then, specific attacks based on adversarial examples and the respective defensive methods are reviewed in detail within the framework of eight principal cybersecurity application categories. Finally, the main trends in recent research are outlined, and the impact of recent advancements in adversarial machine learning is explored to provide guidelines and directions for future research in cybersecurity. In summary, this work is the first to systematically analyze adversarial example-based attacks in the cybersecurity field, discuss possible defenses, and highlight promising directions for future research.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Adversarial Examples: Attacks and Defenses for Deep Learning
    Yu, Xiaoyong
    He, Pan
    Zhu, Qile
    Li, Xiaolin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) : 2805 - 2824
  • [2] Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
    Zhou, Shuai
    Liu, Chi
    Ye, Dayong
    Zhu, Tianqing
    Zhou, Wanlei
    Yu, Philip S.
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (08)
  • [3] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu, Ai-Shan
    Guo, Jun
    Li, Si-Min
    Xiao, Yi-Song
    Liu, Xiang-Long
    Tao, Da-Cheng
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [4] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    [J]. NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [5] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    [J]. ENGINEERING, 2020, 6 (03) : 346 - 360
  • [6] How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
    Costa, Joana C.
    Roxo, Tiago
    Proenca, Hugo
    Inacio, Pedro Ricardo Morais
    [J]. IEEE ACCESS, 2024, 12 : 61113 - 61136
  • [7] Adversarial Attacks and Defenses for Deep Learning Models
    Li, Minghui
    Jiang, Peipei
    Wang, Qian
    Shen, Chao
    Li, Qi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 909 - 926
  • [8] Adversarial examples: attacks and defences on medical deep learning systems
    Murali Krishna Puttagunta
    S. Ravi
    C Nelson Kennedy Babu
    [J]. Multimedia Tools and Applications, 2023, 82 : 33773 - 33809
  • [9] Adversarial examples: attacks and defences on medical deep learning systems
    Puttagunta, Murali Krishna
    Ravi, S.
    Babu, C. Nelson Kennedy
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (22) : 33773 - 33809
  • [10] A survey on cybersecurity attacks and defenses for unmanned aerial systems
    Wang, Zhaoxuan
    Li, Yang
    Wu, Shihao
    Zhou, Yuan
    Yang, Libin
    Xu, Yuan
    Zhang, Tianwei
    Pan, Quan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138