Detection of Iterative Adversarial Attacks via Counter Attack

被引:0
|
作者
Rottmann, Matthias [1 ]
Maag, Kira [2 ]
Peyron, Mathis [3 ]
Gottschalk, Hanno [4 ]
Krejic, Natasa [5 ]
机构
[1] Univ Wuppertal, Dept Math, Wuppertal, Germany
[2] Ruhr Univ Bochum, Fac Comp Sci, Bochum, Germany
[3] Inst Rech Informat Toulouse, Toulouse, France
[4] Tech Univ Berlin, Inst Math, Berlin, Germany
[5] Univ Novi Sad, Fac Sci, Dept Math & Informat, Novi Sad, Serbia
关键词
Deep neural networks; Adversarial attacks; Counter attacks; Asymptotically perfect detection;
D O I
10.1007/s10957-023-02273-6
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Deep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs. Various attacks, hardening methods and detection methods have been introduced in recent years. Notoriously, Carlini-Wagner (CW)type attacks computed by iterative minimization belong to those that are most difficult to detect. In this work we outline a mathematical proof that the CW attack can be used as a detector itself. That is, under certain assumptions and in the limit of attack iterations this detector provides asymptotically optimal separation of original and attacked images. In numerical experiments, we experimentally validate this statement and furthermore obtain AUROC values up to 99.73% on CIFAR10 and ImageNet. This is in the upper part of the spectrum of current state-of-the-art detection rates for CW attacks.
引用
收藏
页码:892 / 929
页数:38
相关论文
共 50 条
  • [31] Adversarial attacks on fingerprint liveness detection
    Jianwei Fei
    Zhihua Xia
    Peipeng Yu
    Fengjun Xiao
    EURASIP Journal on Image and Video Processing, 2020
  • [32] Gradient-based Adversarial Attack Detection via Deep Feature Extraction
    Michel, Andy
    Ewetz, Rickard
    SOUTHEASTCON 2022, 2022, : 213 - 220
  • [33] Adversarial Defense on Harmony: Reverse Attack for Robust AI Models Against Adversarial Attacks
    Kim, Yebon
    Jung, Jinhyo
    Kim, Hyunjun
    So, Hwisoo
    Ko, Yohan
    Shrivastava, Aviral
    Lee, Kyoungwoo
    Hwang, Uiwon
    IEEE ACCESS, 2024, 12 : 176485 - 176497
  • [34] AutoDA: Automated Decision-based Iterative Adversarial Attacks
    Fu, Qi-An
    Dong, Yinpeng
    Su, Hang
    Zhu, Jun
    Zhang, Chao
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3557 - 3574
  • [35] The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks
    Assion, Felix
    Schlicht, Peter
    Gressner, Florens
    Gunther, Wiebke
    Huger, Fabian
    Schmidt, Nico
    Rasheed, Umair
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, : 1370 - 1379
  • [36] Nesterov Adam Iterative Fast Gradient Method for Adversarial Attacks
    Chen, Cheng
    Wang, Zhiguang
    Fan, Yongnian
    Zhang, Xue
    Li, Dawei
    Lu, Qiang
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT I, 2022, 13529 : 586 - 598
  • [37] ADMS: An online attack detection and mitigation system for LDoS attacks via SDN
    Tang, Dan
    Wang, Xiyin
    Yan, Yudong
    Zhang, Dongshuo
    Zhao, Huan
    COMPUTER COMMUNICATIONS, 2022, 181 : 454 - 471
  • [38] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [39] Unified robust network embedding framework for community detection via extreme adversarial attacks
    Zhu, Wenjie
    Chen, Chunchun
    Peng, Bo
    INFORMATION SCIENCES, 2023, 643
  • [40] Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks
    Sivamani, Kirthi Shankar
    Sahay, Rajeev
    Gamal, Aly El
    IEEE Letters of the Computer Society, 2020, 3 (01): : 25 - 28