Adversarial Learning in the Cyber Security Domain

07/05/2020
by   Ihai Rosenberg, et al.
0

In recent years, machine learning algorithms, and more specially, deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (e.g., malware developers) exist. This paper comprehensively summarizes the latest research on adversarial attacks against security solutions that are based on machine learning techniques and presents the risks they pose to cyber security solutions. First, we discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain. Following that, we define a unified taxonomy, where the adversarial attack methods are characterized based on their stage of occurrence, and the attacker's goals and capabilities. Then, we categorize the applications of adversarial attack techniques in the cyber security domain. Finally, we use our taxonomy to shed light on gaps in the cyber security domain that have already been addressed in other adversarial learning domains and discuss their impact on future adversarial learning trends in the cyber security domain.

READ FULL TEXT
research
11/06/2019

The Threat of Adversarial Attacks on Machine Learning in Network Security – A Survey

Machine learning models have made many decision support systems to be fa...
research
04/07/2020

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Cyber security adversaries and engagements are ubiquitous and ceaseless....
research
04/13/2018

Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries

Nowadays more and more data are gathered for detecting and preventing cy...
research
05/11/2021

Survey and Taxonomy of Adversarial Reconnaissance Techniques

Adversaries are often able to penetrate networks and compromise systems ...
research
03/14/2023

Constrained Adversarial Learning and its applicability to Automated Software Testing: a systematic review

Every novel technology adds hidden vulnerabilities ready to be exploited...
research
10/13/2022

A Game Theoretical vulnerability analysis of Adversarial Attack

In recent times deep learning has been widely used for automating variou...
research
07/27/2018

A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence

Malware such as banking Trojans are popular with financially-motivated c...

Please sign up or login with your details

Forgot password? Click here to reset