2018
DOI: 10.14429/dsj.68.12371
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Adversarial Machine Learning in Cyber Warfare

Abstract: The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data analytics, data-mining and automation in decision making poses grave threats to business and economy in adversarial environments. Adversarial machine learning is a fast growing area of research which studies the design of Machine Learning algorithms that are rob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(40 citation statements)
references
References 25 publications
0
32
0
Order By: Relevance
“…As these algorithms are used increasingly in business, military, and other real-world use-cases, the requirements for security of these systems and privacy of their data become proportionally more important. Within cyber-security systems, machine learning algorithms are considered to be the weakest link because their nature of constant evolution, and the ability of sophisticated adversaries to manipulate their behaviours to exploit models [6]. There are several ways in which an adversary can violate a machine learning model [23].…”
Section: Adversarial Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…As these algorithms are used increasingly in business, military, and other real-world use-cases, the requirements for security of these systems and privacy of their data become proportionally more important. Within cyber-security systems, machine learning algorithms are considered to be the weakest link because their nature of constant evolution, and the ability of sophisticated adversaries to manipulate their behaviours to exploit models [6]. There are several ways in which an adversary can violate a machine learning model [23].…”
Section: Adversarial Machine Learningmentioning
confidence: 99%
“…The field of adversarial machine learning (AML) was coined to study how adversarial techniques can potentially exploit ML algorithms, and develop robust strategies to defend systems against the exposure these algorithms generate [5]. AML has been studied out in a number of fields, including image classification [6] and intrusion detection [7,8]. There have been very few studies in IoT systems [3].…”
Section: Introductionmentioning
confidence: 99%
“…Gradient masking comprises a group of defensive techniques which assume that ''if the model is non-differentiable or if the model's gradient is zero at data points, then gradient based attacks are ineffective'' [23]. One form of gradient masking is gradient hiding, which consists on using non differentiable models to perform classification, such as decision trees.…”
Section: Adversarial Defensesmentioning
confidence: 99%
“…Models are many times trained with assumptions in mind for convenience or ease of computation, such as feature independence and linear separability of the data, but these types of assumptions can often open possibilities for adversarial attacks [23].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation