Cargando…

Vulnerabilities of Connectionist AI Applications: Evaluation and Defense

This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on t...

Descripción completa

Detalles Bibliográficos
Autores principales: Berghoff, Christian, Neu, Matthias, von Twickel, Arndt
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7931957/
https://www.ncbi.nlm.nih.gov/pubmed/33693396
http://dx.doi.org/10.3389/fdata.2020.00023
_version_ 1783660391569555456
author Berghoff, Christian
Neu, Matthias
von Twickel, Arndt
author_facet Berghoff, Christian
Neu, Matthias
von Twickel, Arndt
author_sort Berghoff, Christian
collection PubMed
description This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on the IT security goal integrity, many additional aspects, such as interpretability, robustness and documentation are taken into account. A comprehensive list of threats and possible mitigations is presented by reviewing the state-of-the-art literature. AI-specific vulnerabilities, such as adversarial attacks and poisoning attacks are discussed in detail, together with key factors underlying them. Additionally and in contrast to former reviews, the whole AI life cycle is analyzed with respect to vulnerabilities, including the planning, data acquisition, training, evaluation and operation phases. The discussion of mitigations is likewise not restricted to the level of the AI system itself but rather advocates viewing AI systems in the context of their life cycles and their embeddings in larger IT infrastructures and hardware devices. Based on this and the observation that adaptive attackers may circumvent any single published AI-specific defense to date, the article concludes that single protective measures are not sufficient but rather multiple measures on different levels have to be combined to achieve a minimum level of IT security for AI applications.
format Online
Article
Text
id pubmed-7931957
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Frontiers Media S.A.
record_format MEDLINE/PubMed
spelling pubmed-79319572021-03-09 Vulnerabilities of Connectionist AI Applications: Evaluation and Defense Berghoff, Christian Neu, Matthias von Twickel, Arndt Front Big Data Big Data This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on the IT security goal integrity, many additional aspects, such as interpretability, robustness and documentation are taken into account. A comprehensive list of threats and possible mitigations is presented by reviewing the state-of-the-art literature. AI-specific vulnerabilities, such as adversarial attacks and poisoning attacks are discussed in detail, together with key factors underlying them. Additionally and in contrast to former reviews, the whole AI life cycle is analyzed with respect to vulnerabilities, including the planning, data acquisition, training, evaluation and operation phases. The discussion of mitigations is likewise not restricted to the level of the AI system itself but rather advocates viewing AI systems in the context of their life cycles and their embeddings in larger IT infrastructures and hardware devices. Based on this and the observation that adaptive attackers may circumvent any single published AI-specific defense to date, the article concludes that single protective measures are not sufficient but rather multiple measures on different levels have to be combined to achieve a minimum level of IT security for AI applications. Frontiers Media S.A. 2020-07-22 /pmc/articles/PMC7931957/ /pubmed/33693396 http://dx.doi.org/10.3389/fdata.2020.00023 Text en Copyright © 2020 Berghoff, Neu and von Twickel. http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
spellingShingle Big Data
Berghoff, Christian
Neu, Matthias
von Twickel, Arndt
Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title_full Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title_fullStr Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title_full_unstemmed Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title_short Vulnerabilities of Connectionist AI Applications: Evaluation and Defense
title_sort vulnerabilities of connectionist ai applications: evaluation and defense
topic Big Data
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7931957/
https://www.ncbi.nlm.nih.gov/pubmed/33693396
http://dx.doi.org/10.3389/fdata.2020.00023
work_keys_str_mv AT berghoffchristian vulnerabilitiesofconnectionistaiapplicationsevaluationanddefense
AT neumatthias vulnerabilitiesofconnectionistaiapplicationsevaluationanddefense
AT vontwickelarndt vulnerabilitiesofconnectionistaiapplicationsevaluationanddefense