A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

被引:236
|
作者
Liu, Qiang [1 ]
Li, Pan [1 ]
Zhao, Wentao [1 ]
Cai, Wei [2 ]
Yu, Shui [3 ]
Leung, Victor C. M. [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[3] Deakin Univ Melbourne, Sch Informat Technol, Burwood Campus, Burwood, Vic 3125, Australia
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Machine learning; adversarial samples; security threats; defensive techniques; ATTACKS;
D O I
10.1109/ACCESS.2018.2805680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning is one of the most prevailing techniques in computer science, and it has been widely applied in image processing, natural language processing, pattern recognition, cybersecurity, and other fields. Regardless of successful applications of machine learning algorithms in many scenarios, e.g., facial recognition, malware detection, automatic driving, and intrusion detection, these algorithms and corresponding training data are vulnerable to a variety of security threats, inducing a significant performance decrease. Hence, it is vital to call for further attention regarding security threats and corresponding defensive techniques of machine learning, which motivates a comprehensive survey in this paper. Until now, researchers from academia and industry have found out many security threats against a variety of learning algorithms, including naive Bayes, logistic regression, decision tree, support vector machine (SVM), principle component analysis, clustering, and prevailing deep neural networks. Thus, we revisit existing security threats and give a systematic survey on them from two aspects, the training phase and the testing/inferring phase. After that, we categorize current defensive techniques of machine learning into four groups: security assessment mechanisms, countermeasures in the training phase, those in the testing or inferring phase, data security, and privacy. Finally, we provide five notable trends in the research on security threats and defensive techniques of machine learning, which are worth doing in-depth studies in future.
引用
收藏
页码:12103 / 12117
页数:15
相关论文
共 50 条
  • [1] Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment
    Chen Hongsong
    Zhang Yongpeng
    Cao Yongrui
    Bharat Bhargava
    Wireless Personal Communications, 2021, 117 : 3505 - 3525
  • [2] Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment
    Chen Hongsong
    Zhang Yongpeng
    Cao Yongrui
    Bhargava, Bharat
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3505 - 3525
  • [3] Survey on Techniques, Applications and Security of Machine Learning Interpretability
    Ji S.
    Li J.
    Du T.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2071 - 2096
  • [4] A survey of security threats in federated learning
    Feng, Yunhao
    Guo, Yanming
    Hou, Yinjian
    Wu, Yulun
    Lao, Mingrui
    Yu, Tianyuan
    Liu, Gang
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (02)
  • [5] Machine Learning Techniques for Data Mining: A Survey
    Sharma, Seema
    Agrawal, Jitendra
    Agarwal, Shikha
    Sharma, Sanjeev
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 162 - 167
  • [6] Survey on applications of deep learning and machine learning techniques for cyber security
    Alghamdi M.I.
    Alghamdi, Mohammed I. (mialmushilah@bu.edu.sa), 2020, International Association of Online Engineering (14): : 210 - 224
  • [7] A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
    Shaukat, Kamran
    Luo, Suhuai
    Varadharajan, Vijay
    Hameed, Ibrahim A.
    Xu, Min
    IEEE ACCESS, 2020, 8 : 222310 - 222354
  • [8] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742
  • [9] Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
    Chen, Huaming
    Babar, M. Ali
    ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [10] From distributed machine learning to federated learning: In the view of data privacy and security
    Shen, Sheng
    Zhu, Tianqing
    Wu, Di
    Wang, Wei
    Zhou, Wanlei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):