4.7 Article

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems

Journal

ACM COMPUTING SURVEYS
Volume 55, Issue 9, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3559104

Keywords

Adversarial machine learning; attack graphs; threat analysis; risk assessment

Ask authors/readers for more resources

This article comprehensively analyzes the threats to machine learning production systems, using the ontology presented by NIST for evaluating enterprise network security risk and applying it to ML-based systems. The analysis includes enumerating assets, describing the threat model, identifying threats, and reviewing attacks. A novel scoring system is introduced to quantify the risk posed by adversarial machine learning attacks. An extension to the MulVAL attack graph generation and analysis framework is developed to incorporate cyberattacks on ML production systems, providing security practitioners with a tool for evaluating and quantifying the impact of a cyberattack.
Although cyberattacks on machine learning (ML) production systems can be harmful, today, security practitioners are ill-equipped, lacking methodologies and tactical tools that would allow them to analyze the security risks of their ML-based systems. In this article, we perform a comprehensive threat analysis of ML production systems. In this analysis, we follow the ontology presented by NIST for evaluating enterprise network security risk and apply it to ML-based production systems. Specifically, we (1) enumerate the assets of a typical ML production system, (2) describe the threat model (i.e., potential adversaries, their capabilities, and their main goal), (3) identify the various threats to ML systems, and (4) review a large number of attacks, demonstrated in previous studies, which can realize these threats. To quantify the risk posed by adversarial machine learning (AML) threat, we introduce a novel scoring system that assigns a severity score to different AML attacks. The proposed scoring system utilizes the analytic hierarchy process (AHP) for ranking-with the assistance of security experts-various attributes of the attacks. Finally, we developed an extension to the MulVAL attack graph generation and analysis framework to incorporate cyberattacks on ML production systems. Using this extension, security practitioners can apply attack graph analysis methods in environments that include ML components thus providing security practitioners with a methodological and practical tool for both evaluating the impact and quantifying the risk of a cyberattack targeting ML production systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available