The security of machine learning

@article{Barreno2010TheSO,
  title={The security of machine learning},
  author={Marco Barreno and Blaine Nelson and A. Joseph and J. Tygar},
  journal={Machine Learning},
  year={2010},
  volume={81},
  pages={121-148}
}
Machine learning’s ability to rapidly evolve to changing and complex situations has helped it become a fundamental tool for computer security. That adaptability is also a vulnerability: attackers can exploit machine learning systems. We present a taxonomy identifying and analyzing attacks against machine learning systems. We show how these classes influence the costs for the attacker and defender, and we give a formal structure defining their interaction. We use our framework to survey and… Expand
548 Citations
Machine Learning Security
Evaluating the security of machine learning algorithms
  • 7
  • PDF
Cyber Attacks Against the PC Learning Algorithm
  • 3
Advanced attack and defense techniques in machine learning systems
  • PDF
Hacking Machine Learning: Towards The Comprehensive Taxonomy of Attacks Against Machine Learning Systems
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
  • 131
  • PDF
On Recent Security Issues in Machine Learning
  • M. Alani
  • Computer Science
  • 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
  • 2020
Behavior of Machine Learning Algorithms in Adversarial Environments
  • 23
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 55 REFERENCES
Can machine learning be secure?
  • 636
  • PDF
Exploiting Machine Learning to Subvert Your Spam Filter
  • 230
  • PDF
Mimicry attacks on host-based intrusion detection systems
  • 723
  • PDF
Adversarial learning
  • 585
  • Highly Influential
  • PDF
Allergy Attack Against Automatic Signature Generation
  • 67
  • Highly Influential
  • PDF
Adversarial classification
  • 721
  • PDF
Paragraph: Thwarting Signature Learning by Training Maliciously
  • 192
  • Highly Influential
  • PDF
Evading network anomaly detection systems: formal reasoning and practical techniques
  • 167
  • Highly Influential
  • PDF
Hiding Intrusions: From the Abnormal to the Normal and Beyond
  • 83
  • PDF
On Attacking Statistical Spam Filters
  • 206
  • Highly Influential
  • PDF
...
1
2
3
4
5
...