Adversarial Machine Learning

Adversarial machine learning (ML) involves the disruption of machine learning practices, which can stall business processes or even cause serious human injury.


Portions of this definition originally appeared on CIO Insight and are excerpted here with permission.

What are the types of adversarial machine learning?

While a fairly new approach, the growing popularity of machine learning makes it an attractive target for cyberattacks such as data poisoning. Adversarial ML attacks focus on obstructing initial machine learning training and deep learning or interfering with trained ML so the ML confuses its instructions and makes a mistake. Examples of adversarial ML attacks include:

  • Poisoning/contaminating attacks involve disguising malicious data as training data to make small, often inscrutable, changes to training data over time in order to train ML systems to make bad decisions. The disguised data is often difficult to detect and are rarely caught until long after the ML training phase.
  • Evasion attacks involve testing an ML system for vulnerabilities after it has been trained, so attackers can discover ways to evade security safeguards and gain access to the algorithms and code that guide the ML system’s actions. These attacks can damage everything from intended outputs to data quality to system confidentiality.

Go in-depth on how businesses can prevent adversarial ML attacks | CIOInsight.com

Examples of adversarial ML attacks

While only a small number of adversarial ML attacks have been successful, with victims spanning Amazon, Google, Tesla, and Microsoft, any company could suffer from an adversarial ML attack.

To stay ahead of attackers, data and IT professionals practice adversarial attacks to see how different ML scripts and ML-enabled technologies respond to them. Some of the attacks they have attempted and believe could be successfully launched in the near future include:

  • 3D printing human facial features to fool facial recognition technology
  • Adding new markers to roads or road signs to misdirect self-driving cars
  • Inserting additional text in command scripts for military drones to change their travel or attack vectors
  • Changing command recognition for home assistant IoT technology, so it will perform the same action (or no action) for very different command sets

What are the risks of adversarial ML?

While some adversarial ML attacks have resulted in ultimately negligible consequences, they have the potential to cause serious damage to human life and business processes, such as:

  • Physical danger and death could happen as a result of altered algorithms and code for self-driving cars and military drones.
  • Private training data can be stolen and used by competitors.
  • An inability to recognize or fix altered training algorithms can leave machines unusable.
  • Disruption of supply chain and/or other business processes can lead to delays and frustrated customers.
  • A violation of personal data privacy can lead to identity theft for customers, resulting in fines and loss of reputation.

Defending against an adversarial ML attack

Adversarial ML attacks may seem unavoidable, but enterprises can take these proactive steps to protect their machine learning tools and algorithms:

  • Strengthen endpoint security and audit existing security measures regularly.
  • Take both in-training and trained ML systems through adversarial training and attack simulations.
  • Change up classification model algorithms, so attackers can’t easily predict and learn training methods.
  • Become familiar with an adversarial example library to sharpen knowledge of attacks and defense methods.

Learn more about how MITRE protection tests shed new light on endpoint security.

eSecurityPlanet.com


 

Shelby Hiter
Shelby Hiter
Shelby Hiter is a writer with more than five years of experience in writing and editing, focusing on healthcare, technology, data, enterprise IT, and technology marketing. She currently writes for four different digital publications in the technology industry: Datamation, Enterprise Networking Planet, CIO Insight, and Webopedia. When she’s not writing, Shelby loves finding group trivia events with friends, cross stitching decorations for her home, reading too many novels, and turning her puppy into a social media influencer.

Related Articles

Photo Editing Software

Photo editing software is used to manipulate or enhance digital images. This category of software ranges from basic apps, which are able to apply...

SOHO Business Solutions: Free Email Marketing Services

Just like big businesses, SOHO (small office/home office) owners can leverage email marketing systems to communicate with customers, partners and employees. Just like big businesses,...

Fintech

Fintech, also known as "financial technology," is a term used to describe companies that use innovative technology to create more efficient, transparent, and cost-effective...

Cyber Security

Cyber security is the practice of protecting computer systems, networks, and data by using a variety of different strategies and tools. Many large companies...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...