Towards Security Threats of Deep Learning Systems: A Survey

被引:38
|
作者
He, Yingzhe [1 ,2 ]
Meng, Guozhu [1 ,2 ]
Chen, Kai [1 ,2 ]
Hu, Xingbo [1 ,2 ]
He, Jinwen [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100864, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cybersecur, Beijing 100864, Peoples R China
基金
北京市自然科学基金;
关键词
Deep learning; Security; Data models; Privacy; Predictive models; Training data; poisoning attack; adversarial attack; model extraction attack; model inversion attack; ATTACKS; PRIVACY; NOISE;
D O I
10.1109/TSE.2020.3034721
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent weaknesses, which can threaten the security of learning models. Deep learning's wide use further magnifies the impact and consequences. To this end, lots of research has been conducted with the purpose of exhaustively identifying intrinsic weaknesses and subsequently proposing feasible mitigation. Yet few are clear about how these weaknesses are incurred and how effective these attack approaches are in assaulting deep learning. In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude some findings in multiple views. In particular, we focus on four types of attacks associated with security threats of deep learning: model extraction attack, model inversion attack, poisoning attack and adversarial attack. For each type of attack, we construct its essential workflow as well as adversary capabilities and attack goals. Pivot metrics are devised for comparing the attack approaches, by which we perform quantitative and qualitative analyses. From the analysis, we have identified significant and indispensable factors in an attack vector, e.g., how to reduce queries to target models, what distance should be used for measuring perturbation. We shed light on 18 findings covering these approaches' merits and demerits, success probability, deployment complexity and prospects. Moreover, we discuss other potential security weaknesses and possible mitigation which can inspire relevant research in this area.
引用
收藏
页码:1743 / 1770
页数:28
相关论文
共 50 条
  • [1] Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
    Chen, Huaming
    Babar, M. Ali
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [2] Survey on identification and prediction of security threats using various deep learning models on software testing
    Suman
    Khan, Raees Ahmad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (27) : 69863 - 69874
  • [3] RFID systems: A survey on security threats and proposed solutions
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 159 - 170
  • [4] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [5] Towards Security Threats that Matter
    Tuma, Katja
    Scandariato, Riccardo
    Widman, Mathias
    Sandberg, Christian
    [J]. COMPUTER SECURITY, 2017, 2018, 10683 : 47 - 62
  • [6] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    [J]. Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [7] Towards Privacy and Security of Graph Learning: A Survey
    Xian X.-P.
    Wu T.
    Qiao S.-J.
    Wu Y.
    Liu Y.-B.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (06): : 1184 - 1212
  • [8] Computer Security Threats Towards the E-Learning System Assets
    Zamzuri, Zainal Fikri
    Manaf, Mazani
    Ahmad, Adnan
    Yunus, Yuzaimi
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 335 - 345
  • [9] A survey on security of UAV and deep reinforcement learning
    Sarikaya, Burcu Sonmez
    Bahtiyar, Serif
    [J]. AD HOC NETWORKS, 2024, 164
  • [10] Privacy and Security Issues in Deep Learning: A Survey
    Liu, Ximeng
    Xie, Lehui
    Wang, Yaopeng
    Zou, Jian
    Xiong, Jinbo
    Ying, Zuobin
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2021, 9 : 4566 - 4593