دانلود مقاله انگلیسی رایگان:هک کردن هوش مصنوعی - نسل بعدی سیستم های ربوده شده - 2020
بلافاصله پس از پرداخت دانلود کنید
دانلود مقاله انگلیسی هوش مصنوعی رایگان
  • Hacking the AI - the Next Generation of Hijacked Systems Hacking the AI - the Next Generation of Hijacked Systems
    Hacking the AI - the Next Generation of Hijacked Systems

    سال انتشار:

    2020


    عنوان انگلیسی مقاله:

    Hacking the AI - the Next Generation of Hijacked Systems


    ترجمه فارسی عنوان مقاله:

    هک کردن هوش مصنوعی - نسل بعدی سیستم های ربوده شده


    منبع:

    IEEE - 2020 12th International Conference on Cyber Conflict (CyCon);2020;1300; ;


    نویسنده:

    Kim Hartmann , Christoph Steup


    چکیده انگلیسی:

    Within the next decade, the need for automation, intelligent data handling and pre-processing is expected to increase in order to cope with the vast amount of information generated by a heavily connected and digitalised world. Over the past decades, modern computer networks, infrastructures and digital devices have grown in both complexity and interconnectivity. Cyber security personnel protecting these assets have been confronted with increasing attack surfaces and advancing attack patterns. In order to manage this, cyber defence methods began to rely on automation and (artificial) intelligence supporting the work of humans. However, machine learning (ML) and artificial intelligence (AI) supported methods have not only been integrated in network monitoring and endpoint security products but are almost omnipresent in any application involving constant monitoring, complex or large volumes of data. Intelligent IDS, automated cyber defence, network monitoring and surveillance as well as secure software development and orchestration are all examples of assets that are reliant on ML and automation. These applications are of considerable interest to malicious actors due to their importance to society. Furthermore, ML and AI methods are also used in audio-visual systems utilised by digital assistants, autonomous vehicles, face-recognition applications and many others. Successful attack vectors targeting the AI of audio-visual systems have already been reported. These attacks range from requiring little technical knowledge to complex attacks hijacking the underlying AI. With the increasing dependence of society on ML and AI, we must prepare for the next generation of cyber attacks being directed against these areas. Attacking a system through its learning and automation methods allows attackers to severely damage the system, while at the same time allowing them to operate covertly. The combination of being inherently hidden through the manipulation made, its devastating impact and the wide unawareness of AI and ML vulnerabilities make attack vectors against AI and ML highly favourable for malicious operators. Furthermore, AI systems tend to be difficult to analyse post-incident as well as to monitor during operations. Discriminating a compromised from an uncompromised AI in real-time is still considered difficult. In this paper, we report on the state of the art of attack patterns directed against AI and ML methods. We derive and discuss the attack surface of prominent learning mechanisms utilised in AI systems. We conclude with an analysis of the implications of AI and ML attacks for the next decade of cyber conflicts as well as mitigations strategies and their limitations.
    Keywords: AI hijacking | artificial intelligence | machine learning | cyber attack | cyber security


    سطح: متوسط
    تعداد صفحات فایل pdf انگلیسی: 23
    حجم فایل: 1594 کیلوبایت

    قیمت: رایگان


    توضیحات اضافی:




اگر این مقاله را پسندیدید آن را در شبکه های اجتماعی به اشتراک بگذارید (برای به اشتراک گذاری بر روی ایکن های زیر کلیک کنید)

تعداد نظرات : 0

الزامی
الزامی
الزامی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi