skip to main content
10.1145/3600160.3605077acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence

Published:29 August 2023Publication History

ABSTRACT

Cyber deception has emerged as a valuable technique in the field of cybersecurity, closely linked with adversarial Artificial Intelligence. In an era of pervasive automation, it is getting prominence as a research topic aimed at understanding how novel machine learning algorithms can be deceived using adversarial attacks that exploit vulnerabilities of their models. To this end, the paper describes the state-of-the-art of cyber deception for adversarial AI purposes, focusing on its benefits, challenges, and advanced techniques. In addition, this exploratory research attempts to extend its applicability to the fact that an appropriate and timely discovery of adversarial plans and associated actions may enhance own cyber resilience by introducing analytical findings of the adversary's intent into decision-making for cyber situational awareness. The study of adversarial thinking is as old as history and is one of the most relevant subjects rapidly incorporated into the operational planning process – a methodology to understand the operational environment. Adversarial knowledge is used for adapting own cyber defences in response to the cyber threat landscape.

References

  1. Liebowitz, Nepal “Deception for Cyber Defence: Challenges and Opportunities”, Cyber Security Research Centre Limited, 2022Google ScholarGoogle Scholar
  2. Buczak, Guven, “A survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE Communications Surveys & Tutorials, Vol. 18, No. 2, Second Quarter 2016Google ScholarGoogle Scholar
  3. Cohen, Lambert “A framework for Deception”, National Security Issues in Science, Law, and Technology, (pp. 123-219), 2007Google ScholarGoogle ScholarCross RefCross Ref
  4. Papernot, McDaniel et. al. “Practical black-box attacks against machine learning”, Asia conference on computer and communications security, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Calder, “A Case for Deception in the Defense”, Military Cyber Affairs, Vol 2, Issue 1, 2016Google ScholarGoogle ScholarCross RefCross Ref
  6. Biggio, Nelson, Laskov, “Poisoning Attacks against Support Vector Machines”, Proceedings of the 29th International Conference on International Conference on Machine Learning, 2012Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. NIST AI 100-2e2023 ipd, “Adversarial Machine Learning – a taxonomy and terminology of attacks and mitigations”, 2023Google ScholarGoogle Scholar
  8. Zhang, Song et. al, “Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning”, 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2020Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chen, Zhang, “ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models”, 24th ACM Conference on Computer and Communications Security, 2017Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Carlini, Wagner, “Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods”, University of California, 2017Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Madry, Makelov “Towards Deep Learning Models Resistant to Adversarial Attacks”, ICLR, 2017Google ScholarGoogle Scholar
  12. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial SamplesGoogle ScholarGoogle Scholar
  13. Papernot, McDaniel, On the Effectiveness of Defensive Distillation, Pennsylvania State University, 2016Google ScholarGoogle Scholar
  14. Doan, Abbasnejad et. al., “Februus: Input Purification Defense Against Trojan Attacks on Deep NeuralNetwork Systems”, 2020Google ScholarGoogle Scholar
  15. Wang, Sun , “Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey”, 2023Google ScholarGoogle Scholar
  16. Kumar, Shetty et. al., " Adversarial Attack on Machine Learning Models", International Journal of Advanced Research in Computer and Communication Engineering, 2023.Google ScholarGoogle Scholar

Index Terms

  1. The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
      August 2023
      1440 pages
      ISBN:9798400707728
      DOI:10.1145/3600160

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate228of451submissions,51%
    • Article Metrics

      • Downloads (Last 12 months)94
      • Downloads (Last 6 weeks)11

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format