2020
DOI: 10.48550/arxiv.2007.02407
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

Abstract: In recent years, machine learning algorithms, and more specially, deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (e.g., malware developers) exist. This paper comprehensively summarizes the latest research on adversarial attacks ag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 96 publications
0
5
0
Order By: Relevance
“…For example, malicious devices may attempt to mimic the traffic of a legitimate device in order to connect to the network. Fortunately, it is very difficult to do this while preserving the intended malicious functionality [102]. As discussed in [15], the rogue device must be able to generate similar requests to the manufacturer's servers and get similar responses, which is difficult to achieve if device authentication is required.…”
Section: B Reducing the Cost Of Feature Extractionmentioning
confidence: 99%
“…For example, malicious devices may attempt to mimic the traffic of a legitimate device in order to connect to the network. Fortunately, it is very difficult to do this while preserving the intended malicious functionality [102]. As discussed in [15], the rogue device must be able to generate similar requests to the manufacturer's servers and get similar responses, which is difficult to achieve if device authentication is required.…”
Section: B Reducing the Cost Of Feature Extractionmentioning
confidence: 99%
“…However, since ML have been proven to be very instrumental in the progress of CPS, a number of researchers are beginning to explore the field of AML with focus on CPS. Rosenberg et al [107] in their study of adversarial learning in cybersecurity presented CPS and industrial control systems as a case study. Cai et al [108] studied an advanced emergency braking system for self-driving cars that operates by using DNN to estimate the proximity to an obstacle.…”
Section: Adversarial Machine Learning (Aml) and Cpsmentioning
confidence: 99%
“…Proposal [21] presents an overview of different adversarial attacks, including FGSM. However, unlike our motivation, they use the MNIST and CIFAR10 datasets, not a custom dataset.…”
Section: Related Workmentioning
confidence: 99%