Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

01/18/2023
by   Yusuke Kawamoto, et al.
0

In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security, and discuss its characteristics. Next, we enumerate all relevant assets and stakeholders and provide a general taxonomy for ML-specific threats. Then, we collect a wide range of security controls against ML-specific threats through an extensive review of recent literature. Finally, we classify the vulnerabilities and controls of an ML-based system in terms of each vulnerable asset in the system's entire lifecycle.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/30/2022

Threat Assessment in Machine Learning based Systems

Machine learning is a field of artificial intelligence (AI) that is beco...
research
11/05/2018

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

The exponential increase in dependencies between the cyber and physical ...
research
08/01/2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives

The development of the Internet of Drones (IoD) becomes vital because of...
research
05/08/2020

Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities

As many industries shift towards centralised controlled information syst...
research
12/18/2020

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

As machine learning systems grow in scale, so do their training data req...
research
07/31/2023

To Classify is to Interpret: Building Taxonomies from Heterogeneous Data through Human-AI Collaboration

Taxonomy building is a task that requires interpreting and classifying d...
research
08/24/2023

Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities

Spurred by the recent rapid increase in the development and distribution...

Please sign up or login with your details

Forgot password? Click here to reset