The Cybersecurity Challenge for Deep Learning Systems
Nowadays, many enterprises put the adoption of Artificial Intelligence (AI) systems at the very top of their strategic agendas. There is a surge of interest in the capabilities of AI, as it can automate activities and enable intelligent data-driven business processes. Deep learning systems and technologies represent a prominent segment of AI systems, which has proven its capability to deliver exceptional intelligence. As a prominent example, Google’s notorious Alpha AI platform that beat a genius grandmaster in the GO game is largely based on deep learning. Also, emerging applications like autonomous driving and cognitive unmanned aerial vehicles, comprise many deep learning components.
Deep learning has some key differences from traditional machine learning systems. It can work with less structured datasets and exhibits much better performance when trained with very large amounts of training datasets. That’s probably the number one factor driving the popularity of deep learning and deep neural networks: their performance reaches “plateau” much later than traditional machine learning i.e. they can leverage huge datasets to further improve their performance. In an era where new data are produced at an exponential pace, this is a very compelling advantage. Moreover, the mechanics of deep learning are very interesting, as it uses algorithms and mathematics that can to some extent mimic the human thought process. With the exponential growth of storage and computational capabilities, such systems are gradually operating more similar to the human brain than any other system.
Nevertheless, the growth of deep learning does not only come with exciting opportunities for intelligent applications. It also introduces some new challenges as well. Some of these challenges are found in the area of cybersecurity, as it is possible for adversaries to attack deep neural networks. Such attacks can take place both at the training time of the network and at the execution time. Two of the most prominent types of attacks against Deep Learning systems are evasion and poisoning attacks. Poisoning attacks occur at the time of training of the neural network, while evasion attacks concern their execution phase. Both of these attacks can have a catastrophic effect on the applications where deep neural networks are deployed.
Evasion represents the most common attack type against deep learning systems during production. Evasion attacks provide a deep neural network with adversarial inputs that cannot be correctly identified by the system. For example, deep learning is used by autonomous cars to identify the driving context. Hence, they comprise deep neural networks that identify traffic lights and road signs, such as “Stop” and Speed Limits signs. In this context, an evasion attack may involve the creation of a modified Stop sign that cannot be classified as such by the deep neural networks. Towards launching evasion attacks, attackers have to create such modified, adversarial input, which is commonly characterized as a set of “adversarial examples”. In many cases, humans can correctly identify and classify such examples. There are however cases where humans can be fooled by adversarial patterns as well.
The concept of evasion attacks is not new. There are hundreds of evasion attack examples and many relevant cyber-protection solutions in the research literature. However, during the last couple of years, there has been a rapid increase in research outcomes on describing and confronting evasion attacks. The proliferation of such attacks is mainly due to the ever-increasing number of deep learning techniques and of their deployments in real-life use cases.
There are various techniques for confronting evasion attacks and for building relevant cyber-defense systems. Two of the most popular techniques include:
In several cases, malicious parties attack neural networks and other machine learning systems at the time when they are trained. Such attacks can be very effective given that many machine learning systems are (re)trained very frequently. For instance, a significant number of machine learning systems are retrained whenever new data become available. This is very common in applications like retail, finance and social media marketing systems.
Poisoning is one of the most common attacks that occur during the training phase of the project. It refers to the contamination of the data that are used to train a classifier, towards compromising its ability to operate correctly. A historically well-known type of poisoning attacks concerns spam e-mail classifiers that were fed with wrong classification data in order to yield their operation unreliable. The contamination of a neural network can take place in different ways, including:
There are also solutions for defending deep learning systems against poisoning attacks. The key is to understand that the deep learning system has been contaminated. To this end, techniques that explain the operation of a deep neural network can be employed. By explaining the operation of a network, it is possible to detect whether it has been trained to behave in an abnormal way (e.g., based on unusual or strange rules). Accordingly, adversarial training data can be identified and removed.
Overall, AI systems come with many exciting application opportunities, yet they also introduce new challenges. Cybersecurity challenges such as poisoning and evasion attacks are among them. Fortunately, there are tools and techniques for confronting these attacks. The challenge for AI system deployers and security experts is, therefore, to plan for addressing these challenges based on the implementation of relevant cybersecurity systems.
Six Ingredients of Data Management Intelligence
Top Strategic Priorities for CIOs in 2021
Positioning Your IT for Success in 2021
Customer Centric Processes: From CRM to Customer Data Platforms
Robotic Process Automation: A Driver for Cost-Efficient Enterprises Processes
Seven Ways COVID19 has Changed the CIO Role
AIOps: Empowering Automated and Intelligent Cloud Operations
Shaping the Future of Enterprise Content Management with Artificial Intelligence
An Introduction to Continuous Integration and Workflows
Cloud Leaks: The basics you need to know
We're here to help!
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
If you are a Service Provider looking to register, please fill out
this Information Request and someone will get in
Enter your email id and we'll send a link to reset your password to the address
we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is
no cost to get on-board;
if you are competent in your areas of focus, then you are welcome. As a part of this exclusive