Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks

被引:2
|
作者
Younis, Fadi [1 ]
Miri, Ali [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
关键词
Adversarial machine learning; Deception-as-a-defence; Exploratory attacks; Evasion attacks; High-interaction honeypots; Honey-tokens;
D O I
10.1007/978-3-030-29729-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The market demand for online machine-learning services is increasing, and so have the threats against them. Adversarial inputs represent a new threat to Machine-Learning-as-a-Services (MLaaSs). Meticulously crafted malicious inputs can be used to mislead and confuse the learning model, even in cases where the adversary only has limited access to input and output labels. As a result, there has been an increased interest in defence techniques to combat these types of attacks. In this paper, we propose a network of High-Interaction Honeypots (HIHP) as a decentralized defence framework that prevents an adversary from corrupting the learning model. We accomplish our aim by (1) preventing the attacker from correctly learning the labels and approximating the architecture of the black-box system; (2) luring the attacker away, towards a decoy model, using Adversarial HoneyTokens; and finally (3) creating infeasible computational work for the adversary.
引用
收藏
页码:24 / 48
页数:25
相关论文
共 50 条
  • [1] Exploiting random perturbations to defend against adversarial attacks
    Zawistowski, Pawel
    Twardowski, Bartlomiej
    [J]. PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2018, 2018, 10808
  • [2] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    Marshev, I. I.
    Zhukovskii, E., V
    Aleksandrova, E. B.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1025 - 1028
  • [3] Enhanced Security Against Volumetric DDoS Attacks Using Adversarial Machine Learning
    Shroff, Jugal
    Walambe, Rahee
    Singh, Sunil Kumar
    Kotecha, Ketan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    I. I. Marshev
    E. V. Zhukovskii
    E. B. Aleksandrova
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 1025 - 1028
  • [5] Using Undervolting as an on-Device Defense Against Adversarial Machine Learning Attacks
    Majumdar, Saikat
    Samavatian, Mohammad Hossein
    Barber, Kristin
    Teodorescu, Radu
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 158 - 169
  • [6] Using bilateral filtering and autoencoder to defend against adversarial attacks for object detection
    Wang, Xiaoqin
    Sun, Lei
    Mao, Xiuqing
    Yang, Youhuan
    Liu, Peiyuan
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [7] Defend Against Jamming Attacks Using Deep Reinforcement Learning
    Shen, Weiguo
    Wang, Wei
    Jin, Hu
    Zhang, Weifeng
    [J]. 13th International Symposium on Antennas, Propagation and EM Theory, ISAPE 2021 - Proceedings, 2021,
  • [8] Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks
    Taran, Olga
    Rezaeifar, Shideh
    Voloshynovskiy, Slava
    [J]. COMPUTER VISION - ECCV 2018 WORKSHOPS, PT II, 2019, 11130 : 267 - 279
  • [9] RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
    Fang, Yong
    Huang, Cheng
    Xu, Yijia
    Li, Yang
    [J]. FUTURE INTERNET, 2019, 11 (08)
  • [10] Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
    Luo, Xupeng
    Yan, Qiao
    Wang, Mingde
    Huang, Wenyao
    [J]. 2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 392 - 395