Modeling security violation processes in machine learning systems

The widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the ones occurring in information systems susceptible...

Full description

Bibliographic Details
Main Authors: Maxim A. Chekmarev, Stanislav G. Klyuev, Viktor V. Shadskiy
Format: Article
Language:English
Published: Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University) 2021-08-01
Series:Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki
Subjects:
Online Access:https://ntv.ifmo.ru/file/article/20592.pdf
id doaj-43988b8c3969436aab97aac912f39f3c
record_format Article
spelling doaj-43988b8c3969436aab97aac912f39f3c2021-08-23T10:58:49ZengSaint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki2226-14942500-03732021-08-0121459259810.17586/2226-1494-2021-21-4-592-598Modeling security violation processes in machine learning systemsMaxim A. Chekmarev0https://orcid.org/0000-0002-6832-9991Stanislav G. Klyuev1https://orcid.org/0000-0002-0534-9143Viktor V. Shadskiy2https://orcid.org/0000-0002-9221-2283PhD Student, Krasnodar Higher Military School, Krasnodar, 350063, Russian FederationPhD, Associate Professor, Krasnodar Higher Military School, Krasnodar, 350063, Russian FederationPhD Student, Krasnodar Higher Military School, Krasnodar, 350063, Russian FederationThe widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the ones occurring in information systems susceptible to malicious influences. The results of modeling events leading to a security breach in machine learning systems operating at critical information infrastructure facilities are presented. For modeling, the technology of creating functional models SADT (Structured Analysis and Design Technique) and the IDEF0 (Integration definition for function modeling) methodology were used as a tool for transition from a verbal functional description of the process under study to a description in terms of mathematical representation. In order to study the scenarios of the transition of machine learning systems to a dangerous state and the numerical assessment of the probability of security violation, mathematical modeling of threats was carried out using the logical-probabilistic method. The authors obtained a visual functional model of system security violation in the form of a context diagram of the system and two levels of decomposition. The hazard function of the system is determined and the arithmetic polynomial of the probability function is derived. In further work the described models will allow researchers to develop methods and algorithms for protecting machine learning systems from malicious influences, as well as to apply them in assessing the level of security.https://ntv.ifmo.ru/file/article/20592.pdfmachine learningsecurity breachintegrityconfidentialityfunctional modelinglogical probabilistic modeling
collection DOAJ
language English
format Article
sources DOAJ
author Maxim A. Chekmarev
Stanislav G. Klyuev
Viktor V. Shadskiy
spellingShingle Maxim A. Chekmarev
Stanislav G. Klyuev
Viktor V. Shadskiy
Modeling security violation processes in machine learning systems
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki
machine learning
security breach
integrity
confidentiality
functional modeling
logical probabilistic modeling
author_facet Maxim A. Chekmarev
Stanislav G. Klyuev
Viktor V. Shadskiy
author_sort Maxim A. Chekmarev
title Modeling security violation processes in machine learning systems
title_short Modeling security violation processes in machine learning systems
title_full Modeling security violation processes in machine learning systems
title_fullStr Modeling security violation processes in machine learning systems
title_full_unstemmed Modeling security violation processes in machine learning systems
title_sort modeling security violation processes in machine learning systems
publisher Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)
series Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki
issn 2226-1494
2500-0373
publishDate 2021-08-01
description The widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the ones occurring in information systems susceptible to malicious influences. The results of modeling events leading to a security breach in machine learning systems operating at critical information infrastructure facilities are presented. For modeling, the technology of creating functional models SADT (Structured Analysis and Design Technique) and the IDEF0 (Integration definition for function modeling) methodology were used as a tool for transition from a verbal functional description of the process under study to a description in terms of mathematical representation. In order to study the scenarios of the transition of machine learning systems to a dangerous state and the numerical assessment of the probability of security violation, mathematical modeling of threats was carried out using the logical-probabilistic method. The authors obtained a visual functional model of system security violation in the form of a context diagram of the system and two levels of decomposition. The hazard function of the system is determined and the arithmetic polynomial of the probability function is derived. In further work the described models will allow researchers to develop methods and algorithms for protecting machine learning systems from malicious influences, as well as to apply them in assessing the level of security.
topic machine learning
security breach
integrity
confidentiality
functional modeling
logical probabilistic modeling
url https://ntv.ifmo.ru/file/article/20592.pdf
work_keys_str_mv AT maximachekmarev modelingsecurityviolationprocessesinmachinelearningsystems
AT stanislavgklyuev modelingsecurityviolationprocessesinmachinelearningsystems
AT viktorvshadskiy modelingsecurityviolationprocessesinmachinelearningsystems
_version_ 1721198490512523264