


Machine learning creates new attack surfaces, requiring specialized defenses
Machine learning (ML) input and output are becoming increasingly common as businesses in nearly every industry integrate artificial intelligence (AI) technology into their hardware and software products. become more and more widely available to customers. This naturally attracts the attention of malicious actors.
HiddenLayer CEO Christopher Sestito talks about machine learning security considerations and related threats that enterprises should worry about.
Businesses are slowly realizing the avenues that machine learning can open up for them. But are they also paying close attention to cybersecurity?
Few businesses are focused on protecting their machine learning assets, and even fewer are allocating resources to machine learning security. There are many reasons for this, including competing budget priorities, scarcity of talent, and, until recently, a lack of security products that addressed this issue.
Over the past decade, we’ve seen every industry adopt AI/machine learning in unprecedented ways to address every use case with available data. The advantages are proven, but as we’ve seen with other new technologies, they quickly become a new attack surface for malicious actors.
As machine learning operations advance, data science teams are building a more mature AI ecosystem in terms of effectiveness, efficiency, reliability, and explainability, but security has yet to be prioritized. This is no longer a viable path for enterprise enterprises because the motivations for attacking machine learning L systems are clear, attack tools are available and easy to use, and potential targets are growing at an unprecedented rate.
How do attackers leverage public machine learning inputs?
As machine learning models are integrated into more and more production systems, they are being demonstrated to customers in hardware and software products, web applications, mobile applications, and more. This trend, often referred to as “edge AI,” brings incredible decision-making and predictive capabilities to all the technologies we use every day. Delivering machine learning to an increasing number of end users while exposing those same machine learning assets to threat actors.
Machine learning models that are not exposed online are also at risk. These models can be accessed through traditional cyber attack techniques, paving the way for adversarial machine learning opportunities. Once threat actors gain access, they can use several types of attacks. Inference attacks attempt to map or "invert" a model, thereby being able to exploit weaknesses in the model, tamper with the functionality of the overall product, or copy and steal the model itself.
People have seen real-life examples of this attacking security vendors to bypass antivirus or other protection mechanisms. An attacker could also choose to poison the data used to train the model to mislead the system into learning incorrectly and tip decision-making in the attacker's favor.
What threats to machine learning systems should enterprises be particularly worried about?
While all adversarial machine learning attack types need to be defended against, different enterprises will have different priorities. Financial institutions leveraging machine learning models to identify fraudulent transactions will be highly focused on defending against inference attacks.
If attackers understand the strengths and weaknesses of a fraud detection system, they can use it to alter their techniques to go undetected, bypassing the model entirely. Healthcare enterprises may be more sensitive to data poisoning. The medical field was an early adopter of predicting outcomes through machine learning using its massive historical data sets.
Data poisoning attacks can lead to misdiagnosis, altered drug trial results, misrepresented patient populations, etc. Security enterprises themselves are currently focusing on machine learning evasion attacks, which are actively used to deploy ransomware or backdoor networks.
What are the key security considerations chief information security officers (CISOs) should keep in mind when deploying machine learning-driven systems?
The best advice that can be given to chief information security officers (CISOs) today is to embrace the patterns we have learned in emerging technologies. Like our advances in cloud infrastructure, machine learning deployments represent a new attack surface that requires specialized defenses. The barrier to entry for adversarial machine learning attacks is lowering every day using open source attack tools like Microsoft’s Counterfit or IBM’s Adversarial Robustness Toolbox.
Another major consideration is that many of these attacks are not obvious, and if you are not looking for them, you may not understand that they are happening. As security practitioners, we are used to ransomware, which is a clear indication that a business has been compromised and data has been locked or stolen. Adversarial machine learning attacks can be tailored to occur over longer periods of time, and some attacks, such as data poisoning, can be a slower but permanently damaging process.
The above is the detailed content of Machine learning creates new attack surfaces, requiring specialized defenses. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

In the fields of machine learning and data science, model interpretability has always been a focus of researchers and practitioners. With the widespread application of complex models such as deep learning and ensemble methods, understanding the model's decision-making process has become particularly important. Explainable AI|XAI helps build trust and confidence in machine learning models by increasing the transparency of the model. Improving model transparency can be achieved through methods such as the widespread use of multiple complex models, as well as the decision-making processes used to explain the models. These methods include feature importance analysis, model prediction interval estimation, local interpretability algorithms, etc. Feature importance analysis can explain the decision-making process of a model by evaluating the degree of influence of the model on the input features. Model prediction interval estimate

This article will introduce how to effectively identify overfitting and underfitting in machine learning models through learning curves. Underfitting and overfitting 1. Overfitting If a model is overtrained on the data so that it learns noise from it, then the model is said to be overfitting. An overfitted model learns every example so perfectly that it will misclassify an unseen/new example. For an overfitted model, we will get a perfect/near-perfect training set score and a terrible validation set/test score. Slightly modified: "Cause of overfitting: Use a complex model to solve a simple problem and extract noise from the data. Because a small data set as a training set may not represent the correct representation of all data." 2. Underfitting Heru

In the 1950s, artificial intelligence (AI) was born. That's when researchers discovered that machines could perform human-like tasks, such as thinking. Later, in the 1960s, the U.S. Department of Defense funded artificial intelligence and established laboratories for further development. Researchers are finding applications for artificial intelligence in many areas, such as space exploration and survival in extreme environments. Space exploration is the study of the universe, which covers the entire universe beyond the earth. Space is classified as an extreme environment because its conditions are different from those on Earth. To survive in space, many factors must be considered and precautions must be taken. Scientists and researchers believe that exploring space and understanding the current state of everything can help understand how the universe works and prepare for potential environmental crises

Common challenges faced by machine learning algorithms in C++ include memory management, multi-threading, performance optimization, and maintainability. Solutions include using smart pointers, modern threading libraries, SIMD instructions and third-party libraries, as well as following coding style guidelines and using automation tools. Practical cases show how to use the Eigen library to implement linear regression algorithms, effectively manage memory and use high-performance matrix operations.

Machine learning is an important branch of artificial intelligence that gives computers the ability to learn from data and improve their capabilities without being explicitly programmed. Machine learning has a wide range of applications in various fields, from image recognition and natural language processing to recommendation systems and fraud detection, and it is changing the way we live. There are many different methods and theories in the field of machine learning, among which the five most influential methods are called the "Five Schools of Machine Learning". The five major schools are the symbolic school, the connectionist school, the evolutionary school, the Bayesian school and the analogy school. 1. Symbolism, also known as symbolism, emphasizes the use of symbols for logical reasoning and expression of knowledge. This school of thought believes that learning is a process of reverse deduction, through existing

MetaFAIR teamed up with Harvard to provide a new research framework for optimizing the data bias generated when large-scale machine learning is performed. It is known that the training of large language models often takes months and uses hundreds or even thousands of GPUs. Taking the LLaMA270B model as an example, its training requires a total of 1,720,320 GPU hours. Training large models presents unique systemic challenges due to the scale and complexity of these workloads. Recently, many institutions have reported instability in the training process when training SOTA generative AI models. They usually appear in the form of loss spikes. For example, Google's PaLM model experienced up to 20 loss spikes during the training process. Numerical bias is the root cause of this training inaccuracy,

Translator | Reviewed by Li Rui | Chonglou Artificial intelligence (AI) and machine learning (ML) models are becoming increasingly complex today, and the output produced by these models is a black box – unable to be explained to stakeholders. Explainable AI (XAI) aims to solve this problem by enabling stakeholders to understand how these models work, ensuring they understand how these models actually make decisions, and ensuring transparency in AI systems, Trust and accountability to address this issue. This article explores various explainable artificial intelligence (XAI) techniques to illustrate their underlying principles. Several reasons why explainable AI is crucial Trust and transparency: For AI systems to be widely accepted and trusted, users need to understand how decisions are made

In C++, the implementation of machine learning algorithms includes: Linear regression: used to predict continuous variables. The steps include loading data, calculating weights and biases, updating parameters and prediction. Logistic regression: used to predict discrete variables. The process is similar to linear regression, but uses the sigmoid function for prediction. Support Vector Machine: A powerful classification and regression algorithm that involves computing support vectors and predicting labels.
