Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Kawamoto, Yusuke, Miyake, Kazumasa, Konishi, Koichi, Oiwa, Yutaka
Format Paper
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 19.01.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security, and discuss its characteristics. Next, we enumerate all relevant assets and stakeholders and provide a general taxonomy for ML-specific threats. Then, we collect a wide range of security controls against ML-specific threats through an extensive review of recent literature. Finally, we classify the vulnerabilities and controls of an ML-based system in terms of each vulnerable asset in the system's entire lifecycle.
AbstractList In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of machine-learning-based (ML-based) systems. We first classify the damage caused by attacks against ML-based systems, define ML-specific security, and discuss its characteristics. Next, we enumerate all relevant assets and stakeholders and provide a general taxonomy for ML-specific threats. Then, we collect a wide range of security controls against ML-specific threats through an extensive review of recent literature. Finally, we classify the vulnerabilities and controls of an ML-based system in terms of each vulnerable asset in the system's entire lifecycle.
Author Miyake, Kazumasa
Oiwa, Yutaka
Kawamoto, Yusuke
Konishi, Koichi
Author_xml – sequence: 1
  givenname: Yusuke
  surname: Kawamoto
  fullname: Kawamoto, Yusuke
– sequence: 2
  givenname: Kazumasa
  surname: Miyake
  fullname: Miyake, Kazumasa
– sequence: 3
  givenname: Koichi
  surname: Konishi
  fullname: Konishi, Koichi
– sequence: 4
  givenname: Yutaka
  surname: Oiwa
  fullname: Oiwa, Yutaka
BookMark eNqNi80OATEURhsh8TfvcBNbktEaFTuEWLAysZ0Ul6mMW3o7Yt6eiAew-pJzztcWdXKENdGSSg0Hk5GUTRExX-M4lmMtk0S1RJbmHk3gPuzLgtCbgy1ssPgBhk6wcBS8KxjcGbbmmFtC2KDxZOkCc8N4gl3FAW88hRnsSv_E6ntMzcuRu1Vd0TibgjH6bUf0Vst0sR7cvXuUyCG7utLTR2VSj7VKYq21-q96A8bsRaA
ContentType Paper
Copyright 2023. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2023. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest One Academic
Engineering Collection
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
ID FETCH-proquest_journals_27673507773
IEDL.DBID 8FG
IngestDate Thu Oct 10 17:38:34 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-proquest_journals_27673507773
OpenAccessLink https://www.proquest.com/docview/2767350777?pq-origsite=%requestingapplication%
PQID 2767350777
PQPubID 2050157
ParticipantIDs proquest_journals_2767350777
PublicationCentury 2000
PublicationDate 20230119
PublicationDateYYYYMMDD 2023-01-19
PublicationDate_xml – month: 01
  year: 2023
  text: 20230119
  day: 19
PublicationDecade 2020
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2023
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 3.4529564
SecondaryResourceType preprint
Snippet In this article, we propose the Artificial Intelligence Security Taxonomy to systematize the knowledge of threats, vulnerabilities, and security controls of...
SourceID proquest
SourceType Aggregation Database
SubjectTerms Artificial intelligence
Classification
Literature reviews
Machine learning
Security
Taxonomy
Title Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
URI https://www.proquest.com/docview/2767350777
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFH_oiuDNT_yYI6DHBZe2a6wXcaNzCB1Dq-xW0iR1B2lnu4pe_NtNYqYHYccQEpJHeF_5vd8DuJA97guXh5iQgGM_ZwHOepnAVyHR_N9MmQhdKBxPgvGTfz_rz2zCrbawypVONIpalFznyC9dGlBPOS-U3izesO4apX9XbQuNTXCIZsLTleKju98cixtQ5TF7_9SssR2jHXCmbCGrXdiQxR5sGcglr_chTebaYau76Ll51dzPBqaqAtcuUtE9Gv5gyGtU5ig2iEeJLBnqCxoo2yOQZRu_Rrfosane5adZmLAPU6hwAOejKBmO8epUqX03dfp3S-8QWkVZyCNARKrwN2M5kUToQlXGqRIv77ssED4V7Bja63Y6WT99Ctu6hbpOK5CwDa1l1cgzZWiXWcdIswPOIJpMH9Qo_oq-AQx_iew
link.rule.ids 786,790,12792,21416,33406,33777,43633,43838
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFH5oi-jNn_hjakCPKy5t16xexI2NqmsZWmW3kibZPMg621X0vzeJmR6EnUNCEsL73nv53vcALkWL-dxloYNxwBx_QgMnb-Xc6YRY6X9TCRGqUDhOgujZvx-3xybhVhla5dImakPNC6Zy5FcuCYgnnRdCbubvjuoapX5XTQuNdbCV5GbHArvbT0aPv1kWNyDSZ_b-GVqNHoNtsEd0LsodWBOzXdjQpEtW7UGWviqXrWqil_pNqT9roqoMXZtIxveo98Mir1AxQbHmPApk5FCnqCvRhyOjN36NbtFTXX6ILz0xpZ-6VGEfLgb9tBc5y11l5uVU2d85vQOwZsVMHALCQgbAOZ1ggbkqVaWMyAtmbZcG3CecHkFj1UrHq4fPYTNK42E2vEseTmBLNVRXSQYcNsBalLU4lbC7yM_M3X4DaiSLeA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Threats%2C+Vulnerabilities%2C+and+Controls+of+Machine+Learning+Based+Systems%3A+A+Survey+and+Taxonomy&rft.jtitle=arXiv.org&rft.au=Kawamoto%2C+Yusuke&rft.au=Miyake%2C+Kazumasa&rft.au=Konishi%2C+Koichi&rft.au=Oiwa%2C+Yutaka&rft.date=2023-01-19&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422