战斗机器的时代:网络防御中对抗性人工智能的网络欺骗使用

David Lopes Antunes, Salvador Llopis Sanchez
{"title":"战斗机器的时代:网络防御中对抗性人工智能的网络欺骗使用","authors":"David Lopes Antunes, Salvador Llopis Sanchez","doi":"10.1145/3600160.3605077","DOIUrl":null,"url":null,"abstract":"Cyber deception has emerged as a valuable technique in the field of cybersecurity, closely linked with adversarial Artificial Intelligence. In an era of pervasive automation, it is getting prominence as a research topic aimed at understanding how novel machine learning algorithms can be deceived using adversarial attacks that exploit vulnerabilities of their models. To this end, the paper describes the state-of-the-art of cyber deception for adversarial AI purposes, focusing on its benefits, challenges, and advanced techniques. In addition, this exploratory research attempts to extend its applicability to the fact that an appropriate and timely discovery of adversarial plans and associated actions may enhance own cyber resilience by introducing analytical findings of the adversary's intent into decision-making for cyber situational awareness. The study of adversarial thinking is as old as history and is one of the most relevant subjects rapidly incorporated into the operational planning process – a methodology to understand the operational environment. Adversarial knowledge is used for adapting own cyber defences in response to the cyber threat landscape.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence\",\"authors\":\"David Lopes Antunes, Salvador Llopis Sanchez\",\"doi\":\"10.1145/3600160.3605077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber deception has emerged as a valuable technique in the field of cybersecurity, closely linked with adversarial Artificial Intelligence. In an era of pervasive automation, it is getting prominence as a research topic aimed at understanding how novel machine learning algorithms can be deceived using adversarial attacks that exploit vulnerabilities of their models. To this end, the paper describes the state-of-the-art of cyber deception for adversarial AI purposes, focusing on its benefits, challenges, and advanced techniques. In addition, this exploratory research attempts to extend its applicability to the fact that an appropriate and timely discovery of adversarial plans and associated actions may enhance own cyber resilience by introducing analytical findings of the adversary's intent into decision-making for cyber situational awareness. The study of adversarial thinking is as old as history and is one of the most relevant subjects rapidly incorporated into the operational planning process – a methodology to understand the operational environment. Adversarial knowledge is used for adapting own cyber defences in response to the cyber threat landscape.\",\"PeriodicalId\":107145,\"journal\":{\"name\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3600160.3605077\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 18th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3600160.3605077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络欺骗已成为网络安全领域的一项有价值的技术,与对抗性人工智能密切相关。在一个普遍自动化的时代,它作为一个研究主题越来越突出,旨在了解如何使用利用其模型漏洞的对抗性攻击来欺骗新颖的机器学习算法。为此,本文描述了用于对抗人工智能目的的网络欺骗的最新技术,重点介绍了它的好处、挑战和先进技术。此外,本探索性研究试图将其适用性扩展到这样一个事实,即适当及时地发现对抗计划和相关行动,可以通过将对手意图的分析结果引入网络态势感知决策中来增强自身的网络弹性。对抗性思维的研究与历史一样古老,是最相关的学科之一,迅速融入到作战计划过程中——一种理解作战环境的方法。对抗性知识用于调整自己的网络防御,以应对网络威胁形势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence
Cyber deception has emerged as a valuable technique in the field of cybersecurity, closely linked with adversarial Artificial Intelligence. In an era of pervasive automation, it is getting prominence as a research topic aimed at understanding how novel machine learning algorithms can be deceived using adversarial attacks that exploit vulnerabilities of their models. To this end, the paper describes the state-of-the-art of cyber deception for adversarial AI purposes, focusing on its benefits, challenges, and advanced techniques. In addition, this exploratory research attempts to extend its applicability to the fact that an appropriate and timely discovery of adversarial plans and associated actions may enhance own cyber resilience by introducing analytical findings of the adversary's intent into decision-making for cyber situational awareness. The study of adversarial thinking is as old as history and is one of the most relevant subjects rapidly incorporated into the operational planning process – a methodology to understand the operational environment. Adversarial knowledge is used for adapting own cyber defences in response to the cyber threat landscape.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Confidential Quantum Computing Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era Fingerprint forgery training: Easy to learn, hard to perform Experiences with Secure Pipelines in Highly Regulated Environments Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1