Full Text:   <2755>

Summary:  <1855>

CLC number: TP309

On-line Access: 2024-08-27

Received: 2023-10-17

Revision Accepted: 2024-05-08

Crosschecked: 2018-12-24

Cited: 0

Clicked: 7077

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Jian-hua Li

http://orcid.org/0000-0002-6831-3973

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474

http://doi.org/10.1631/FITEE.1800573


Cyber security meets artificial intelligence: a survey


Author(s):  Jian-hua Li

Affiliation(s):  School of Cyber Security, Shanghai Jiao Tong University, Shanghai 200240, China

Corresponding email(s):   lijh888@sjtu.edu.cn

Key Words:  Cyber security, Artificial intelligence (AI), Attack detection, Defensive techniques


Jian-hua Li. Cyber security meets artificial intelligence: a survey[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12): 1462-1474.

@article{title="Cyber security meets artificial intelligence: a survey",
author="Jian-hua Li",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="19",
number="12",
pages="1462-1474",
year="2018",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1800573"
}

%0 Journal Article
%T Cyber security meets artificial intelligence: a survey
%A Jian-hua Li
%J Frontiers of Information Technology & Electronic Engineering
%V 19
%N 12
%P 1462-1474
%@ 2095-9184
%D 2018
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1800573

TY - JOUR
T1 - Cyber security meets artificial intelligence: a survey
A1 - Jian-hua Li
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 19
IS - 12
SP - 1462
EP - 1474
%@ 2095-9184
Y1 - 2018
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1800573


Abstract: 
There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system.

网络安全遇上人工智能:综述

摘要:网络安全与人工智能技术有着广泛的交叉。一方面,可以将人工智能技术(如深度学习)引入网络安全领域,构建智能模型,实现恶意代码检测、入侵检测和威胁情报感知等。另一方面,人工智能模型面临针对样本、学习过程和决策等的各种威胁。因此,人工智能模型需要网络安全防护技术来对抗各类攻击,实现隐私保护机器学习以及安全的联合深度学习等。本文对人工智能与网络安全交叉研究进行综述,首先总结现有利用人工智能技术对抗网络攻击的研究工作,包括采用传统机器学习技术和深度学习技术在对抗网络攻击方面的应用和效果。然后总结和分析人工智能会遭受的对抗攻击,对现有针对对抗攻击的防御方式进行归类,分析各自特点。最后,从构建加密神经网络和实现安全联合深度学习两个方面阐述现有工作中构建安全人工智能系统的方案。

关键词:网络安全;人工智能;攻击监测;防御技术

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Abeshu A, Chilamkurti N, 2018. Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag, 56(2):169-175.

[2]Akhtar N, Mian A, 2018. Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access, 6:14410-14430.

[3]Akhtar N, Liu J, Mian A, 2018. Defense against universal adversarial perturbations. IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.3389-3398.

[4]Arulkumaran K, Deisenroth MP, Brundage M, et al., 2017. Deep reinforcement learning: a brief survey. IEEE Signal Process Mag, 34(6):26-38.

[5]Aygün RC, Yavuz AG, 2017. A stochastic data discrimination based autoencoder approach for network anomaly detection. Proc 5th Signal Processing and Communications Applications Conf, p.1-4.

[6]Bonawitz K, Ivanov V, Kreuter B, et al., 2017. Practical secure aggregation for privacy-preserving machine learning. Proc ACM SIGSAC Conf on Computer and Communications Security, p.1175-1191.

[7]Bost R, Popa RA, Tu S, et al., 2015. Machine learning classification over encrypted data. Network and Distributed System Security Symp, p.331-364.

[8]Chowdhury MMU, Hammond F, Konowicz G, et al., 2017. A few-shot deep learning approach for improved intrusion detection. Proc 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conf, p.456-462.

[9]Cisse M, Adi Y, Neverova N, et al., 2017. Houdini: fooling deep structured prediction models. https://arxiv.org/abs/1707.05373

[10]Cubuk ED, Zoph B, Schoenholz SS, et al., 2017. Intriguing properties of adversarial examples. https://arxiv.org/abs/1711.02846

[11]Dada EG, 2017. A hybridized SVM-kNN-pdAPSO approach to intrusion detection system. Faculty Seminar Series, p.1-8.

[12]Deng L, Yu D, 2014. Deep learning: methods and applications. Found Trend Sig Process, 7(3-4):197-387.

[13]Feinman R, Curtin RR, Shintre S, et al., 2017. Detecting adversarial samples from artifacts. https://arxiv.org/abs/1703.00410

[14]Gao W, Morris T, Reaves B, et al., 2010. On SCADA control system command and response injection and intrusion detection. eCrime Researchers Summit, p.1-9.

[15]Gebhart T, Schrater P, 2017. Adversary detection in neural networks via persistent homology. https://arxiv.org/abs/1711.10056

[16]Golovko VA, 2017. Deep learning: an overview and main paradigms. Opt Memory Neur Netw, 26(1):1-17.

[17]Goodfellow IJ, Pouget-Abadie J, Mirza M, et al., 2014. Generative adversarial networks. https://arxiv.org/abs/1406.2661

[18]Goodfellow IJ, Shlens J, Szegedy C, 2015. Explaining and harnessing adversarial examples. https://arxiv.org/abs/1412.6572

[19]Gu SX, Rigazio L, 2015. Towards deep neural network architectures robust to adversarial examples. https://arxiv.org/abs/1412.5068

[20]Guan ZT, Li J, Wu LF, et al., 2017. Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid. IEEE Internet Things J, 4(6): 1934-1944.

[21]Hatcher WG, Yu W, 2018. A survey of deep learning: platforms, applications and emerging research trends. IEEE Access, 6:24411-24432.

[22]He W, Wei J, Chen XY, et al., 2017. Adversarial example defenses: ensembles of weak defenses are not strong. https://arxiv.org/abs/1706.04701

[23]Kokila RT, Selvi ST, Govindarajan K, 2014. DDoS detection and analysis in SDN-based environment using support vector machine classifier. Proc 6th Int Conf on Advanced Computing, p.205-210.

[24]Korczak J, Hernes M, 2017. Deep learning for financial time series forecasting in a-trader system. Proc Federated Conf on Computer Science and Information Systems, p.905- 912.

[25]Krotov D, Hopfield J, 2018. Dense associative memory is robust to adversarial inputs. Neur Comput, 30(12): 3151-3167.

[26]LeCun Y, Bengio Y, Hinton G, 2015. Deep learning. Nature, 521(7553):436-444.

[27]Lee H, Han S, Lee J, 2017. Generative adversarial trainer: defense to adversarial perturbations with GAN. https://arxiv.org/abs/1705.03387

[28]Li GL, Wu J, Li JH, et al., 2018. Service popularity-based smart resources partitioning for fog computing-enabled industrial Internet of Things. IEEE Trans Ind Inform, 14(10):4702-4711.

[29]Li LZ, Ota K, Dong MX, 2018a. Deep learning for smart industry: efficient manufacture inspection system with fog computing. IEEE Trans Ind Inform, 14(10):4665- 4673.

[30]Li LZ, Ota K, Dong MX, 2018b. DeepNFV: a light-weight framework for intelligent edge network functions virtualization. IEEE Netw, in press.

[31]Liang B, Li HC, Su MQ, et al., 2017. Detecting adversarial image examples in deep networks with adaptive noise reduction. https://arxiv.org/abs/1705.08378

[32]Loukas G , Vuong T , Heartfield R , et al., 2018. Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access, 6:3491-3508.

[33]Luo Y, Boix X, Roig G, et al., 2015. Foveation-based mechanisms alleviate adversarial examples. https://arxiv.org/abs/1511.06292

[34]Lyu C, Huang KZ, Liang HN, 2015. A unified gradient regularization family for adversarial examples. IEEE Int Conf on Data Mining, p.301-309.

[35]Manning CD, Surdeanu M, Bauer J, et al., 2014. The Stanford CoreNLP natural language processing toolkit. Proc 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, p.55-60.

[36]McMahan HB, Moore E, Ramage D, et al., 2016. Communication-efficient learning of deep networks from decentralized data. https://arxiv.org/abs/1602.05629

[37]Meng DY, Chen H, 2017. MagNet: a two-pronged defense against adversarial examples. Proc ACM Conf on Computer and Communications Security, p.135-147.

[38]Meng WZ, Li WJ, Kwok LF, 2015. Design of intelligent KNN- based alarm filter using knowledge-based alert verification in intrusion detection. Secur Commun Netw, 8(18): 3883-3895.

[39]Meng X, Shan Z, Liu FD, et al., 2017. MCSMGS: malware classification model based on deep learning. Int Conf on Cyber-Enabled Distributed Computing and Knowledge Discovery, p.272-275.

[40]Mnih V, Kavukcuoglu K, Silver D, et al., 2015. Human-level control through deep reinforcement learning. Nature, 518(7540):529-533.

[41]Moon D, Im H, Kim I, et al., 2017. DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput, 73(7):2881-2895.

[42]Moosavi-Dezfooli SM, Fawzi A, Frossard P, 2016. DeepFool: a simple and accurate method to fool deep neural networks. IEEE Conf on Computer Vision and Pattern Recognition, p.2574-2582.

[43]Moosavi-Dezfooli SM, Fawzi A, Fawzi O, et al., 2017. Universal adversarial perturbations. Proc IEEE Conf on Computer Vision and Pattern Recognition, p.86-94.

[44]Mopuri KR, Garg U, Babu RV, 2017. Fast feature fool: a data independent approach to universal adversarial perturbations. https://arxiv.org/abs/1707.05572

[45]Nayebi A, Ganguli S, 2017. Biologically inspired protection of deep networks from adversarial attacks. https://arxiv.org/abs/1703.09202

[46]Olalere M, Abdullah MT, Mahmod R, et al., 2016. Identification and evaluation of discriminative lexical features of malware URL for real-time classification. Int Conf on Computer and Communication Engineering, p.90-95.

[47]Ota K, Dao MS, Mezaris V, et al., 2017. Deep learning for mobile multimedia: a survey. ACM Trans Multim Comput Commun Appl, 13(3S), Article 34.

[48]Papernot N, McDaniel P, Jha S, et al., 2016. The limitations of deep learning in adversarial settings. IEEE European Symp on Security and Privacy, p.372-387.

[49]Phong LT, Aono Y, Hayashi T, et al., 2018. Privacy- preserving deep learning via additively homomorphic encryption. IEEE Trans Inform Forens Secur, 13(5): 1333-1345.

[50]Ren SQ, He KM, Girshick R, et al., 2017. Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Patt Anal Mach Intell, 39(6): 1137-1149.

[51]Ross AS, Doshi-Velez F, 2017. Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. https://arxiv.org/abs/1711.09404

[52]Sabour S, Cao YS, Faghri F, et al., 2015. Adversarial manipulation of deep representations. https://arxiv.org/abs/1511.05122

[53]Shahid N, Aleem SA, Naqvi IH, et al., 2012. Support vector machine based fault detection & classification in smart grids. IEEE Globecom Workshops, p.1526-1531.

[54]Shokri R, Shmatikov V, 2015. Privacy-preserving deep learning. Proc 53rd Annual Allerton Conf on Communication, Control, and Computing, p.1310-1321.

[55]Syarif AR, Gata W, 2017. Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. 11th Int Conf on Information & Communication Technology and System, p.181-186.

[56]Vinayakumar R, Soman KP, Poornachandran P, et al., 2018. Detecting Android malware using long short-term memory (LSTM). J Int Fuzzy Syst, 34(3):1277-1288.

[57]Vollmer T, Manic M, 2009. Computationally efficient neural network intrusion security awareness. Proc 2nd Int Symp on Resilient Control Systems, p.25-30.

[58]Vuong TP, Loukas G, Gan D, et al., 2015. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. IEEE Int Workshop on Information Forensics and Security, p.1-6.

[59]Wu J, Dong MX, Ota K, et al., 2018. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag, 15(1):27-38.

[60]Xie CH, Wang JY, Zhang ZS, et al., 2017. Adversarial examples for semantic segmentation and object detection. IEEE Int Conf on Computer Vision, p.1378-1387.

[61]Xin Y, Kong LS, Liu Z, et al., 2018. Machine learning and deep learning methods for cybersecurity. IEEE Access, 6:35365-35381.

[62]Xu WL, Evans D, Qi YJ, 2017. Feature squeezing mitigates and detects Carlini/Wagner adversarial examples. https://arxiv.org/abs/1705.10686

[63]Yuan XY, 2017. PhD forum: deep learning-based real-time malware detection with multi-stage analysis. IEEE Int Conf on Smart Computing, p.1-2.

[64]Zhao GZ, Zhang CX, Zheng LJ, 2017. Intrusion detection using deep belief network and probabilistic neural network. IEEE Int Conf on Computational Science and Engineering and IEEE Int Conf on Embedded and Ubiquitous Computing, p.639-642.

[65]Zhu DL, Jin H, Yang Y, et al., 2017. DeepFlow: deep learning-based malware detection by mining Android application for abnormal usage of sensitive data. IEEE Symp on Computers and Communications, p.438-443.

[66]Zolotukhin M, Hämäläinen T, Kokkonen T, et al., 2016. Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. Proc 23rd Int Conf on Telecommunications, p.1-6.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE