4.7 Article

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

期刊

ACM COMPUTING SURVEYS
卷 54, 期 5, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3453158

关键词

Adversarial learning; adversarial machine learning; evasion attacks; poisoning attacks; deep learning; adversarial examples; cyber security

向作者/读者索取更多资源

This article presents a comprehensive summary of recent research on adversarial attacks against security solutions based on machine learning techniques, highlighting the associated risks. The methods of adversarial attacks are characterized based on occurrence stage, attacker goals, and capabilities, while categorizing the applications of attack and defense methods in the cyber security domain. It also discusses the impact of recent progress in adversarial learning fields on future research directions in cyber security.
In recent years, machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (e.g., malware developers) exist. This article comprehensively summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques and illuminates the risks they pose. First, the adversarial attack methods are characterized based on their stage of occurrence, and the attacker' s goals and capabilities. Then, we categorize the applications of adversarial attack and defense methods in the cyber security domain. Finally, we highlight some characteristics identified in recent research and discuss the impact of recent advancements in other adversarial learning domains on future research directions in the cyber security domain. To the best of our knowledge, this work is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain, map them in a unified taxonomy, and use the taxonomy to highlight future research directions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据