A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning

Research output: Contribution to journalArticle

Abstract

Machine Learning (ML) algorithms, specifically supervised learning, are widely used in modern real-world applications, which utilize Computational Intelligence (CI) as their core technology, such as autonomous vehicles, assistive robots, and biometric systems. Attacks that cause misclassifications or mispredictions can lead to erroneous decisions resulting in unreliable operations. Designing robust ML with the ability to provide reliable results in the presence of such attacks has become a top priority in the field of adversarial machine learning. An essential characteristic for rapid development of robust ML is an arms race between attack and defense strategists. However, an important prerequisite for the arms race is access to a well-defined system model so that experiments can be repeated by independent researchers. This article proposes a fine-grained system-driven taxonomy to specify ML applications and adversarial system models in an unambiguous manner such that independent researchers can replicate experiments and escalate the arms race to develop more evolved and robust ML applications. The article provides taxonomies for: 1) the dataset, 2) the ML architecture, 3) the adversary’s knowledge, capability, and goal, 4) adversary’s strategy, and 5) the defense response. In addition, the relationships among these models and taxonomies are analyzed by proposing an adversarial machine learning cycle. The provided models and taxonomies are merged to form a comprehensive system-driven taxonomy, which represents the arms race between the ML applications and adversaries in recent years. The taxonomies encode best practices in the field and help evaluate and compare the contributions of research works and reveals gaps in the field.

Original languageEnglish (US)
JournalIEEE Transactions on Emerging Topics in Computational Intelligence
DOIs
StateAccepted/In press - Jan 1 2020

Keywords

  • adversarial machine learning
  • attack model
  • Computational intelligence
  • Computational intelligence (CI)
  • defense model
  • Machine learning
  • Machine learning algorithms
  • Observers
  • Robustness
  • Security
  • supervised learning
  • Taxonomy

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Computational Mathematics
  • Control and Optimization

Fingerprint Dive into the research topics of 'A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning'. Together they form a unique fingerprint.

  • Cite this