loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Anis Bouaziz 1 ; Manh-Dung Nguyen 1 ; Valeria Valdés 1 ; Ana Cavalli 1 ; 2 and Wissam Mallouli 1

Affiliations: 1 Montimage EURL, 39 rue Bobillot 75013, Paris, France ; 2 Institut Telecom SudParis, 5 rue Charles Fourrier 91011 Evry, France

Keyword(s): Cybersecurity, Artificial Intelligence, Adversarial Attacks, Explainability, Countermeasures.

Abstract: Adversarial attacks on AI systems are designed to exploit vulnerabilities in the AI algorithms that can be used to manipulate the output of the system, resulting in incorrect or harmful behavior. They can take many forms, including manipulating input data, exploiting weaknesses in the AI model, and poisoning the training samples used to develop the AI model. In this paper, we study different types of adversarial attacks, including evasion, poisoning, and inference attacks, and their impact on AI-based systems from different fields. A particular emphasis is placed on cybersecurity applications, such as Intrusion Detection System (IDS) and anomaly detection. We also depict different learning methods that allow us to understand how adversarial attacks work using eXplainable AI (XAI). In addition, we discuss the current state-of-the-art techniques for detecting and defending against adversarial attacks, including adversarial training, input sanitization, and anomaly detection. Furthermor e, we present a comprehensive analysis of the effectiveness of different defense mechanisms against different types of adversarial attacks. Overall, this study provides a comprehensive overview of challenges and opportunities in the field of adversarial machine learning, and serves as a valuable resource for researchers, practitioners, and policymakers working on AI security and robustness. An application for anomaly detection, especially malware detection is presented to illustrate several concepts presented in the paper. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.116.40.151

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Bouaziz, A.; Nguyen, M.; Valdés, V.; Cavalli, A. and Mallouli, W. (2023). Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. In Proceedings of the 18th International Conference on Software Technologies - ICSOFT; ISBN 978-989-758-665-1; ISSN 2184-2833, SciTePress, pages 510-517. DOI: 10.5220/0012125100003538

@conference{icsoft23,
author={Anis Bouaziz. and Manh{-}Dung Nguyen. and Valeria Valdés. and Ana Cavalli. and Wissam Mallouli.},
title={Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection},
booktitle={Proceedings of the 18th International Conference on Software Technologies - ICSOFT},
year={2023},
pages={510-517},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012125100003538},
isbn={978-989-758-665-1},
issn={2184-2833},
}

TY - CONF

JO - Proceedings of the 18th International Conference on Software Technologies - ICSOFT
TI - Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection
SN - 978-989-758-665-1
IS - 2184-2833
AU - Bouaziz, A.
AU - Nguyen, M.
AU - Valdés, V.
AU - Cavalli, A.
AU - Mallouli, W.
PY - 2023
SP - 510
EP - 517
DO - 10.5220/0012125100003538
PB - SciTePress