Defense strategies for Adversarial Machine Learning: A survey

被引:5
|
作者
Bountakas, Panagiotis [1 ]
Zarras, Apostolis [1 ]
Lekidis, Alexios [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, 80 Karaoli & Dimitriou, Piraeus 18534, Attica, Greece
基金
欧盟地平线“2020”;
关键词
Survey; Machine Learning; Adversarial Machine Learning; Defense methods; Computer vision; Cybersecurity; Natural Language Processing; Audio; DETECTION SYSTEMS; ATTACKS; INTRUSION; ROBUST; CLASSIFICATION; SECURITY;
D O I
10.1016/j.cosrev.2023.100573
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial Machine Learning (AML) is a recently introduced technique, aiming to deceive Machine Learning (ML) models by providing falsified inputs to render those models ineffective. Consequently, most researchers focus on detecting new AML attacks that can undermine existing ML infrastructures, overlooking at the same time the significance of defense strategies. This article constitutes a survey of the existing literature on AML attacks and defenses with a special focus on a taxonomy of recent works on AML defense techniques for different application domains, such as audio, cyber-security, NLP, and computer vision. The proposed survey also explores the methodology of the defense solutions and compares them using several criteria, such as whether they are attack- and/or domain-agnostic, deploy appropriate AML evaluation metrics, and whether they share their source code and/or their evaluation datasets. To the best of our knowledge, this article constitutes the first survey that seeks to systematize the existing knowledge focusing solely on the defense solutions against AML and providing innovative directions for future research on tackling the increasing threat of AML. & COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Survey on Adversarial Machine Learning for Cyberspace Defense
    Yu, Zheng-Fei
    Yan, Qiao
    Zhou, Yun
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2022, 48 (07): : 1625 - 1649
  • [2] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    [J]. FUTURE INTERNET, 2023, 15 (02)
  • [3] Machine Learning Cyberattack and Defense Strategies
    Bland, John A.
    Petty, Mikel D.
    Whitaker, Tymaine S.
    Maxwell, Katia P.
    Cantrell, Walter Alan
    [J]. COMPUTERS & SECURITY, 2020, 92
  • [4] A Moving Target Defense against Adversarial Machine Learning
    Roy, Abhishek
    Chhabra, Anshuman
    Kamhoua, Charles A.
    Mohapatra, Prasant
    [J]. SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 383 - 388
  • [5] Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
    Tan, Hao
    Wang, Le
    Zhang, Huan
    Zhang, Junjian
    Shafiq, Muhammad
    Gu, Zhaoquan
    [J]. ELECTRONICS, 2022, 11 (14)
  • [6] Adversarial Machine Learning: A Survey on the Influence Axis
    Alzahrani, Shahad
    Almalki, Taghreed
    Alsuwat, Hatim
    Alsuwat, Emad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 193 - 203
  • [7] A Survey of Adversarial Machine Learning in Cyber Warfare
    Duddu, Vasisht
    [J]. DEFENCE SCIENCE JOURNAL, 2018, 68 (04) : 356 - 366
  • [8] Adversarial Machine Learning on Social Network: A Survey
    Guo, Sensen
    Li, Xiaoyu
    Mu, Zhiying
    [J]. FRONTIERS IN PHYSICS, 2021, 9
  • [9] The security of machine learning in an adversarial setting: A survey
    Wang, Xianmin
    Li, Jing
    Kuang, Xiaohui
    Tan, Yu-an
    Li, Jin
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 12 - 23
  • [10] Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
    Khamaiseh, Samer Y.
    Bagagem, Derek
    Al-Alaj, Abdullah
    Mancino, Mathew
    Alomari, Hakam W.
    [J]. IEEE ACCESS, 2022, 10 : 102266 - 102291