Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
Vähäkainu, P., Lehto, M., & Kariluoto, A. (2021). Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context. In H. Jahankhani, A. Jamal, & S. Lawson (Eds.), Cybersecurity, Privacy and Freedom Protection in the Connected World : Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (pp. 157-169). Springer. Advanced Sciences and Technologies for Security Applications. https://doi.org/10.1007/978-3-030-68534-8_11
Date
2021Copyright
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attacks provide a utility for perpetrators to modify, for example, a testing dataset of a victim ML-model. In this article, we conduct a literature review concerning evasion attacks and countermeasures and discuss how these attacks can be utilized in order to deceive the, i.e., CPS smart lock system’s ML-classifier to gain access to the smart building.
...
Publisher
SpringerParent publication ISBN
978-3-030-68533-1Conference
International Conference on Global Security, Safety and SustainabilityIs part of publication
Cybersecurity, Privacy and Freedom Protection in the Connected World : Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021ISSN Search the Publication Forum
1613-5113Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/89699010
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ... -
Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2022)Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ... -
Instrumenting OpenCTI with a Capability for Attack Attribution Support
Ruohonen, Sami; Kirichenko, Alexey; Komashinskiy, Dmitriy; Pogosova, Mariam (MDPI AG, 2024)In addition to identifying and prosecuting cyber attackers, attack attribution activities can provide valuable information for guiding defenders’ security procedures and supporting incident response and remediation. However, ...