4.7 Article

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey

期刊

ACM COMPUTING SURVEYS
卷 54, 期 7, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3465171

关键词

Cyber attacks; machine learning; information leakage; cyber security; controlled information

向作者/读者索取更多资源

In recent years, stealing attacks against controlled information using machine learning algorithms have emerged as a significant cyber security threat, making detection and defense challenging and urgent. This survey reviews the recent advances in this type of attack, categorizes them into three types based on the targeted controlled information, and proposes countermeasures focusing on detection, disruption, and isolation for effective protection.
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances in this new type of attack and corresponding countermeasures. The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. Recent publications are summarized to generalize an overarching attack methodology and to derive the limitations and future directions of ML-based stealing attacks. Furthermore, countermeasures are proposed towards developing effective protections from three aspects- detection, disruption, and isolation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据