Adversarial Machine Learning: Threats and Mitigation Strategies

Authors

  • Sandeep Raj Author

Keywords:

Adversarial Attacks, Adversarial Machine Learning, Evasion Attacks, Poisoning Attacks, Model Robustness, Mitigation Strategies, Security in ML

Abstract

Adversarial machine learning is an emerging field that focuses on the
vulnerabilities of machine learning models to adversarial attacks—intentional manipulations of
input data designed to deceive models into making incorrect predictions. This paper reviews the
state of adversarial machine learning before 2013, discussing the different types of threats (e.g.,
evasion attacks, poisoning attacks), potential impacts on machine learning systems, and
strategies for mitigating these threats. The paper explores early techniques such as adversarial
training, model regularization, and anomaly detection, highlighting their strengths and
limitations. While significant challenges remain, early research laid the groundwork for future
advancements in building more robust machine learning systems.

REFERENCES


1. Barreno, M., Nelson, B., Joseph, A. D., & Tygar, J. D. (2006). The security of machine
learning. Machine Learning, 81(2), 121-148.
2. Dalvi, N., Domingos, P., Mausam, Sanghai, S., & Verma, D. (2004). Adversarial
classification. Proceedings of the 10th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining (KDD '04), 99-108.
3. Lowd, D., & Meek, C. (2005). Adversarial learning. Proceedings of the 11th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining (KDD '05), 641-647.
4. Kearns, M., & Li, M. (1993). Learning in the presence of malicious errors. SIAM Journal on
Computing, 22(4), 807-837.
5. Globerson, A., & Roweis, S. (2006). Nightmare at test time: Robust learning by feature
deletion. Proceedings of the 23rd International Conference on Machine Learning (ICML '06),
353-360.
6. Nelson, B., Barreno, M., Chi, F. J., Joseph, A. D., Rubinstein, B. I. P., & Tygar, J. D. (2008).
Exploiting machine learning to subvert your spam filter. LEET, 8, 1-9.
7. Laskov, P., & Kloft, M. (2009). A framework for quantitative security analysis of machine
learning. Proceedings of the 2nd ACM Workshop on Artificial Intelligence and Security
(AISec '09), 1-10.
8. Biggio, B., Fumera, G., & Roli, F. (2008). Adversarial pattern classification using multiple
classifiers and randomisation. Joint IAPR International Workshop on Structural, Syntactic,
and Statistical Pattern Recognition, 500-509.
9. Schwartzbard, A., Stolfo, S. J., & Keromytis, A. D. (2000). Measuring intrusion detection
systems using a cost-based model. Proceedings of the DARPA Information Survivability
Conference & Exposition (DISCEX '00), 2, 473-483.
10. Wagner, D. (2004). Resilient aggregation in sensor networks. Proceedings of the 2nd ACM
Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), 78-87.
11. Newsome, J., Karp, B., & Song, D. (2006). Polygraph: Automatically generating signatures
for polymorphic worms. IEEE Symposium on Security and Privacy, 226-241.
12. Rubinstein, B. I. P., Nelson, B., Huang, L., Joseph, A. D., & Tygar, J. D. (2009).
ANTIDOTE: Understanding and defending against poisoning attacks on machine learning
models.
13. Bruckner, M., & Scheffer, T. (2009). Stackelberg games for adversarial prediction problems.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining (KDD '09), 547-556.
International Journal of Artificial Intelligence and Machine Learning in
Engineering 315|p
14. Xiao, H., Zhou, J., & Gao, X. (2009). A game theoretical framework for adversarial
classification. Proceedings of the 2nd ACM Workshop on Artificial Intelligence and Security
(AISec '09), 21-30.
15. Ravi Kumar Perumallapalli, Machine Learning Approaches for Improving Supply Chain
Efficiency and Demand Prediction - Perumallapalli Ravikumar - IJSAT Volume 1, Issue 2,
April-June 2010.
16. Ravi Kumar Perumallapalli, "AI-Driven Optimization of Healthcare Diagnostics: Early
Detection in Real-World Systems", IJCSPUB - INTERNATIONAL JOURNAL OF
CURRENT SCIENCE (www.IJCSPUB.org), ISSN:2250-1770, Vol.1, Issue 1, page no.76-86,
March 2011, Available :https://rjpn.org/IJCSPUB/papers/IJCSP11A1014.pdf
17. Ravi Kumar Perumallapalli, "Autonomous Vehicles: Real-Time AI for Safer Transportation
Networks", IJCSPUB - INTERNATIONAL JOURNAL OF CURRENT SCIENCE
(www.IJCSPUB.org), ISSN:2250-1770, Vol.1, Issue 2, page no.61-69, April 2011,
Available :https://rjpn.org/IJCSPUB/papers/IJCSP11B1012.pdf
18. Ravi Kumar Perumallapalli, " PREDICTIVE MAINTENANCE IN CLOUD
INFRASTRUCTURE: A MACHINE LEARNING FRAMEWORK", IJCSPUB -
INTERNATIONAL JOURNAL OF CURRENT SCIENCE (www.IJCSPUB.org),
ISSN:2250-1770, Vol.1, Issue 1, page no.106-115, January-2011,
Available :https://rjpn.org/IJCSPUB/papers/IJCSP11A1016.pdf
19. Ravi Kumar Perumallapalli, "AI-Enhanced Personalization in E-Commerce: Redefining
Customer Interaction", IJCSPUB - INTERNATIONAL JOURNAL OF CURRENT
SCIENCE (www.IJCSPUB.org), ISSN:2250-1770, Vol.2, Issue 1, page no.114-122, March-
2012, Available :https://rjpn.org/IJCSPUB/papers/IJCSP12A1017.pdf
20. Ravi Kumar Perumallapalli, "Machine Learning Algorithms for Accurate Stock Market
Forecasting: Case Studies 2012", IJCSPUB - INTERNATIONAL JOURNAL OF
CURRENT SCIENCE (www.IJCSPUB.org), ISSN:2250-1770, Vol.2, Issue 4, page no.57-64,
December-2012, Available :https://rjpn.org/IJCSPUB/papers/IJCSP12D1009.pdf
21. Ravi Kumar Perumallapalli, " NATURAL LANGUAGE PROCESSING FOR
AUTOMATED IT SERVICE DESK RESOLUTION", IJCSPUB - INTERNATIONAL
JOURNAL OF CURRENT SCIENCE (www.IJCSPUB.org), ISSN:2250-1770, Vol.2, Issue
1, page no.131-138, January-2012,
Available :https://rjpn.org/IJCSPUB/papers/IJCSP12A1019.pdf

Downloads

Published

20-01-2013