A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

Machine learning is one of the most prevailing techniques in computer science, and it has been widely applied in image processing, natural language processing, pattern recognition, cybersecurity, and other fields. Regardless of successful applications of machine learning algorithms in many scenarios...

Full description

Bibliographic Details
Main Authors: Qiang Liu, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, Victor C. M. Leung
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8290925/
id doaj-cf0cbfd9b05f4406a99de7570848f400
record_format Article
spelling doaj-cf0cbfd9b05f4406a99de7570848f4002021-03-29T20:42:23ZengIEEEIEEE Access2169-35362018-01-016121031211710.1109/ACCESS.2018.28056808290925A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven ViewQiang Liu0https://orcid.org/0000-0003-2922-3518Pan Li1Wentao Zhao2Wei Cai3Shui Yu4https://orcid.org/0000-0003-4485-6743Victor C. M. Leung5College of Computer, National University of Defense Technology, Changsha, ChinaCollege of Computer, National University of Defense Technology, Changsha, ChinaCollege of Computer, National University of Defense Technology, Changsha, ChinaDepartment of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, CanadaSchool of Information Technology, Deakin University Melbourne Burwood Campus, Burwood, VIC, AustraliaDepartment of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, CanadaMachine learning is one of the most prevailing techniques in computer science, and it has been widely applied in image processing, natural language processing, pattern recognition, cybersecurity, and other fields. Regardless of successful applications of machine learning algorithms in many scenarios, e.g., facial recognition, malware detection, automatic driving, and intrusion detection, these algorithms and corresponding training data are vulnerable to a variety of security threats, inducing a significant performance decrease. Hence, it is vital to call for further attention regarding security threats and corresponding defensive techniques of machine learning, which motivates a comprehensive survey in this paper. Until now, researchers from academia and industry have found out many security threats against a variety of learning algorithms, including naive Bayes, logistic regression, decision tree, support vector machine (SVM), principle component analysis, clustering, and prevailing deep neural networks. Thus, we revisit existing security threats and give a systematic survey on them from two aspects, the training phase and the testing/inferring phase. After that, we categorize current defensive techniques of machine learning into four groups: security assessment mechanisms, countermeasures in the training phase, those in the testing or inferring phase, data security, and privacy. Finally, we provide five notable trends in the research on security threats and defensive techniques of machine learning, which are worth doing in-depth studies in future.https://ieeexplore.ieee.org/document/8290925/Machine learningadversarial samplessecurity threatsdefensive techniques
collection DOAJ
language English
format Article
sources DOAJ
author Qiang Liu
Pan Li
Wentao Zhao
Wei Cai
Shui Yu
Victor C. M. Leung
spellingShingle Qiang Liu
Pan Li
Wentao Zhao
Wei Cai
Shui Yu
Victor C. M. Leung
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
IEEE Access
Machine learning
adversarial samples
security threats
defensive techniques
author_facet Qiang Liu
Pan Li
Wentao Zhao
Wei Cai
Shui Yu
Victor C. M. Leung
author_sort Qiang Liu
title A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
title_short A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
title_full A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
title_fullStr A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
title_full_unstemmed A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
title_sort survey on security threats and defensive techniques of machine learning: a data driven view
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Machine learning is one of the most prevailing techniques in computer science, and it has been widely applied in image processing, natural language processing, pattern recognition, cybersecurity, and other fields. Regardless of successful applications of machine learning algorithms in many scenarios, e.g., facial recognition, malware detection, automatic driving, and intrusion detection, these algorithms and corresponding training data are vulnerable to a variety of security threats, inducing a significant performance decrease. Hence, it is vital to call for further attention regarding security threats and corresponding defensive techniques of machine learning, which motivates a comprehensive survey in this paper. Until now, researchers from academia and industry have found out many security threats against a variety of learning algorithms, including naive Bayes, logistic regression, decision tree, support vector machine (SVM), principle component analysis, clustering, and prevailing deep neural networks. Thus, we revisit existing security threats and give a systematic survey on them from two aspects, the training phase and the testing/inferring phase. After that, we categorize current defensive techniques of machine learning into four groups: security assessment mechanisms, countermeasures in the training phase, those in the testing or inferring phase, data security, and privacy. Finally, we provide five notable trends in the research on security threats and defensive techniques of machine learning, which are worth doing in-depth studies in future.
topic Machine learning
adversarial samples
security threats
defensive techniques
url https://ieeexplore.ieee.org/document/8290925/
work_keys_str_mv AT qiangliu asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT panli asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT wentaozhao asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT weicai asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT shuiyu asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT victorcmleung asurveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT qiangliu surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT panli surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT wentaozhao surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT weicai surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT shuiyu surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
AT victorcmleung surveyonsecuritythreatsanddefensivetechniquesofmachinelearningadatadrivenview
_version_ 1724194295218438144