Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems

被引:3
|
作者
Mumcu, Furkan [1 ]
Doshi, Keval [1 ]
Yilmaz, Yasin [1 ]
机构
[1] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
关键词
D O I
10.1109/CVPRW56347.2022.00034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anomaly detection in videos is an important computer vision problem with various applications including automated video surveillance. Although adversarial attacks on image understanding models have been heavily investigated, there is not much work on adversarial machine learning targeting video understanding models and no previous work which focuses on video anomaly detection. To this end, we investigate an adversarial machine learning attack against video anomaly detection systems, that can be implemented via an easy-to-perform cyber-attack. Since surveillance cameras are usually connected to the server running the anomaly detection model through a wireless network, they are prone to cyber-attacks targeting the wireless connection. We demonstrate how Wi-Fi deauthentication attack, a notoriously easy-to-perform and effective denial-of-service (DoS) attack, can be utilized to generate adversarial data for video anomaly detection systems. Specifically, we apply several effects caused by the Wi-Fi deauthentication attack on video quality (e.g., slow down, freeze, fast forward, low resolution) to the popular benchmark datasets for video anomaly detection. Our experiments with several state-of-the-art anomaly detection models show that the attackers can significantly undermine the reliability of video anomaly detection systems by causing frequent false alarms and hiding physical anomalies from the surveillance system.
引用
收藏
页码:205 / 212
页数:8
相关论文
共 50 条
  • [1] Detection of adversarial attacks on machine learning systems
    Judah, Matthew
    Sierchio, Jen
    Planer, Michael
    [J]. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [2] Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems
    Haroon, Muhammad Shahzad
    Ali, Husnain Mansoor
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3513 - 3527
  • [3] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    [J]. FUTURE INTERNET, 2023, 15 (02)
  • [4] Adversarial attacks against supervised machine learning based network intrusion detection systems
    Alshahrani, Ebtihaj
    Alghazzawi, Daniyal
    Alotaibi, Reem
    Rabie, Osama
    [J]. PLOS ONE, 2022, 17 (10):
  • [5] Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems
    Paya, Antonio
    Arroni, Sergio
    Garcia-Diaz, Vicente
    Gomez, Alberto
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [6] Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
    Apruzzese, Giovanni
    Colajanni, Michele
    Ferretti, Luca
    Marchetti, Mirco
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 383 - 400
  • [7] Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network
    Kotenko, I.V.
    Saenko, I.B.
    Lauta, O.S.
    Vasilev, N.A.
    Sadovnikov, V.E.
    [J]. Pattern Recognition and Image Analysis, 2024, 34 (03) : 589 - 596
  • [8] Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems
    Nazari, Najmeh
    Makrani, Hosein Mohammadi
    Fang, Chongzhou
    Omidi, Behnam
    Rafatirad, Setareh
    Sayadi, Hossein
    Khasawneh, Khaled N.
    Homayoun, Houman
    [J]. IEEE MICRO, 2023, 43 (05) : 35 - 44
  • [9] Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems
    Yao, Likai
    Shao, Sicong
    Hariri, Salim
    [J]. 2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [10] Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks
    Alrawashdeh, Khaled
    Goldsmith, Stephen
    [J]. PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2021, : 294 - 301