Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

02/16/2021
by   Yuantian Miao, et al.
7

Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so that governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances in this new type of attack and corresponding countermeasures. The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. Recent publications are summarized to generalize an overarching attack methodology and to derive the limitations and future directions of ML-based stealing attacks. Furthermore, countermeasures are proposed towards developing effective protections from three aspects – detection, disruption, and isolation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/21/2023

Cryptographic ransomware encryption detection: Survey

The ransomware threat has loomed over our digital life since 1989. Crimi...
research
01/25/2022

A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks

Significant progress has been made towards deploying Vehicle-to-Everythi...
research
05/17/2021

RAIDER: Reinforcement-aided Spear Phishing Detector

Spear Phishing is a harmful cyber-attack facing business and individuals...
research
08/30/2021

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning

Protecting and preventing sensitive data from being used inappropriately...
research
11/08/2017

Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques

The IoT is a network of interconnected everyday objects called things th...
research
08/21/2023

A Modular and Adaptive System for Business Email Compromise Detection

The growing sophistication of Business Email Compromise (BEC) and spear ...

Please sign up or login with your details

Forgot password? Click here to reset