A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

被引:236
|
作者
Liu, Qiang [1 ]
Li, Pan [1 ]
Zhao, Wentao [1 ]
Cai, Wei [2 ]
Yu, Shui [3 ]
Leung, Victor C. M. [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[3] Deakin Univ Melbourne, Sch Informat Technol, Burwood Campus, Burwood, Vic 3125, Australia
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Machine learning; adversarial samples; security threats; defensive techniques; ATTACKS;
D O I
10.1109/ACCESS.2018.2805680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning is one of the most prevailing techniques in computer science, and it has been widely applied in image processing, natural language processing, pattern recognition, cybersecurity, and other fields. Regardless of successful applications of machine learning algorithms in many scenarios, e.g., facial recognition, malware detection, automatic driving, and intrusion detection, these algorithms and corresponding training data are vulnerable to a variety of security threats, inducing a significant performance decrease. Hence, it is vital to call for further attention regarding security threats and corresponding defensive techniques of machine learning, which motivates a comprehensive survey in this paper. Until now, researchers from academia and industry have found out many security threats against a variety of learning algorithms, including naive Bayes, logistic regression, decision tree, support vector machine (SVM), principle component analysis, clustering, and prevailing deep neural networks. Thus, we revisit existing security threats and give a systematic survey on them from two aspects, the training phase and the testing/inferring phase. After that, we categorize current defensive techniques of machine learning into four groups: security assessment mechanisms, countermeasures in the training phase, those in the testing or inferring phase, data security, and privacy. Finally, we provide five notable trends in the research on security threats and defensive techniques of machine learning, which are worth doing in-depth studies in future.
引用
收藏
页码:12103 / 12117
页数:15
相关论文
共 50 条
  • [31] MACHINE LEARNING - A SURVEY OF CURRENT TECHNIQUES
    MCDONALD, C
    ARTIFICIAL INTELLIGENCE REVIEW, 1989, 3 (04) : 243 - 280
  • [32] A Survey on Contemporary Security threats in Big Data and Information System
    Jaiswal, Jitendra Kumar
    Samikannu, Rita
    Paramasivam, Ilango
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 263 - 268
  • [33] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [34] Evaluation of Machine Learning Techniques for Security in SDN
    Ahmad, Ahnaf
    Harjula, Erkki
    Ylianttila, Mika
    Ahmad, Ijaz
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
  • [35] Data Driven Prognosis of Cervical Cancer Using ClassBalancing and Machine Learning Techniques
    Arora M.
    Dhawan S.
    Singh K.
    EAI Endorsed Transactions on Energy Web, 2020, 7 (30) : 1 - 9
  • [36] A survey of multi-view machine learning
    Sun, Shiliang
    NEURAL COMPUTING & APPLICATIONS, 2013, 23 (7-8): : 2031 - 2038
  • [37] A survey of multi-view machine learning
    Shiliang Sun
    Neural Computing and Applications, 2013, 23 : 2031 - 2038
  • [38] Security and Privacy of Machine Learning Models: A Survey
    Ji S.-L.
    Du T.-Y.
    Li J.-F.
    Shen C.
    Li B.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 41 - 67
  • [39] The security of machine learning in an adversarial setting: A survey
    Wang, Xianmin
    Li, Jing
    Kuang, Xiaohui
    Tan, Yu-an
    Li, Jin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 12 - 23
  • [40] Machine Learning Security in Industry: A Quantitative Survey
    Grosse, Kathrin
    Bieringer, Lukas
    Besold, Tarek R.
    Biggio, Battista
    Krombholz, Katharina
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1749 - 1762