dc.contributor.author | Vähäkainu, Petri | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.author | Kariluoto, Antti | |
dc.contributor.editor | Jahankhani, Hamid | |
dc.contributor.editor | Jamal, Arshad | |
dc.contributor.editor | Lawson, Shaun | |
dc.date.accessioned | 2021-11-19T08:21:48Z | |
dc.date.available | 2021-11-19T08:21:48Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Vähäkainu, P., Lehto, M., & Kariluoto, A. (2021). Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context. In H. Jahankhani, A. Jamal, & S. Lawson (Eds.), <i>Cybersecurity, Privacy and Freedom Protection in the Connected World : Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021</i> (pp. 157-169). Springer. Advanced Sciences and Technologies for Security Applications. <a href="https://doi.org/10.1007/978-3-030-68534-8_11" target="_blank">https://doi.org/10.1007/978-3-030-68534-8_11</a> | |
dc.identifier.other | CONVID_89699010 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/78720 | |
dc.description.abstract | Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attacks provide a utility for perpetrators to modify, for example, a testing dataset of a victim ML-model. In this article, we conduct a literature review concerning evasion attacks and countermeasures and discuss how these attacks can be utilized in order to deceive the, i.e., CPS smart lock system’s ML-classifier to gain access to the smart building. | en |
dc.format.extent | 469 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cybersecurity, Privacy and Freedom Protection in the Connected World : Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 | |
dc.relation.ispartofseries | Advanced Sciences and Technologies for Security Applications | |
dc.rights | In Copyright | |
dc.subject.other | adversarial machine learning | |
dc.subject.other | defensive mechanisms | |
dc.subject.other | evasion attacks | |
dc.subject.other | cyber-physical system | |
dc.title | Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202111195731 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-3-030-68533-1 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 157-169 | |
dc.relation.issn | 1613-5113 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Conference on Global Security, Safety and Sustainability | |
dc.subject.yso | koneoppiminen | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | älytekniikka | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27260 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-68534-8_11 | |
dc.type.okm | A4 | |