ASRA-Q: AI Security Risk Assessment by Selective Questions

Q4 Computer Science Journal of Information Processing Pub Date : 2023-01-01 DOI:10.2197/ipsjjip.31.654
Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Kentaro Tsuji, Ikuya Morikawa, Nobukazu Yoshioka
{"title":"ASRA-Q: AI Security Risk Assessment by Selective Questions","authors":"Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Kentaro Tsuji, Ikuya Morikawa, Nobukazu Yoshioka","doi":"10.2197/ipsjjip.31.654","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new framework for security risk assessment. To conduct security analysis efficiently, it is necessary for developers to assess the security risks of machine learning based system (MLS) by themselves, but existing technologies cannot be used to such a purpose. Using the proposed framework, MLS developers can assess the security risks of MLSs by themselves. Our framework consists of two phases. In the preparation phase, a machine learning security expert extracts conditions of adversarial attacks for each adversarial attack method and makes an attack tree for each attack method using the extracted conditions. In addition, they prepare yes/no questions corresponding to extracted conditions. In the assessment phase, MLS developers just answer yes/no questions, and the assessment results are shown. We asked some developers to evaluate our proposal by implementing the proposed framework. As a result, they found some vulnerabilities in MLSs they chose to analyze. We received positive comments from them as results of the questionnaire.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2197/ipsjjip.31.654","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper, we propose a new framework for security risk assessment. To conduct security analysis efficiently, it is necessary for developers to assess the security risks of machine learning based system (MLS) by themselves, but existing technologies cannot be used to such a purpose. Using the proposed framework, MLS developers can assess the security risks of MLSs by themselves. Our framework consists of two phases. In the preparation phase, a machine learning security expert extracts conditions of adversarial attacks for each adversarial attack method and makes an attack tree for each attack method using the extracted conditions. In addition, they prepare yes/no questions corresponding to extracted conditions. In the assessment phase, MLS developers just answer yes/no questions, and the assessment results are shown. We asked some developers to evaluate our proposal by implementing the proposed framework. As a result, they found some vulnerabilities in MLSs they chose to analyze. We received positive comments from them as results of the questionnaire.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ASRA-Q:人工智能安全风险评估的选择性问题
本文提出了一种新的安全风险评估框架。为了有效地进行安全分析,开发人员需要自行评估基于机器学习的系统(MLS)的安全风险,但现有技术无法实现这一目的。使用该框架,MLS开发人员可以自行评估MLS的安全风险。我们的框架由两个阶段组成。在准备阶段,机器学习安全专家为每种对抗性攻击方法提取对抗性攻击条件,并利用提取的条件为每种攻击方法制作攻击树。此外,他们还准备了与提取条件相对应的是/否问题。在评估阶段,MLS开发人员只需回答是/否的问题,然后显示评估结果。我们要求一些开发人员通过实现建议的框架来评估我们的建议。因此,他们在mss中发现了一些他们选择分析的漏洞。通过问卷调查,我们收到了他们的积极评价。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Processing
Journal of Information Processing Computer Science-Computer Science (all)
CiteScore
1.20
自引率
0.00%
发文量
0
期刊最新文献
Container-native Managed Data Sharing Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers An Analysis of Susceptibility to Phishing via Business Chat through Online Survey Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1