More

    Four types of cyber attacks against AI models and applications

    AI-driven cyber attacks fundamentally broaden the range of entities, including physical objects, that can be used to carry out cyberattacks, in contrast to conventional cyberattacks that exploit bugs or intentional and unintentional human mistakes in code.

    The main objectives of traditional cybersecurity attacks are system disruption and data extraction. Attacks on AI systems frequently aim to steal data or cause disruptions, but they are designed more subtly and with a longer-term perspective.

    They attempt to take over the targeted system for a specific purpose or trick the model into disclosing its inner workings through system intrusion before altering its behavior. This goal can be achieved through mainly, but not exclusively, four types of attacks: data poisoning, tempering of categorization models, backdoors, and reverse engineering of the AI model.

    - Advertisement -

    1. Data poisoning

    Data poisoning occurs when attackers intentionally introduce false data into a legitimate dataset to train the system to behave differently. It has been demonstrated that an attacker could produce a 75.06% change in the dosage of half of the patients using the AI system for their treatment by adding 8% of inaccurate data.

    2. Tampering with categorization models

    Attackers could change the results of AI system applications by changing the categorization models of, for example, neural networks. For instance, using images of 3D-printed turtles acquired using a particular algorithm, researchers could trick an AI system’s learning process into classifying turtles as rifles.

    3. Backdoors

    AI systems can also be hacked by adversaries using backdoor injection attacks. Such attacks are carried out by the adversary using a specially made perturbation mask applied to particular images to override the correct classifications. The learned deep neural network maintains its normal functionality by using data poisoning from the training set with a low poisoning fraction to inject the backdoor into the victim model. Therefore, once launched, such attacks have the potential to cause significant havoc in a variety of realistic applications, such as sabotaging an autonomous vehicle or passing for someone else to gain unauthorized access.

    - Advertisement -

    4. Reverse engineering the AI model

    By accessing the AI model through reverse engineering, attackers can launch more focused and effective adversarial attacks. For instance, if the training phase is reliable, an adversary can target the ML inference and discover the secret model parameters using the Differential Power Analysis methodology, according to a study by the Institute of Electrical and Electronics Engineers (IEEE). As a result, the adversary may create copies of the system, endangering security and intellectual property.

    Attacks on ML systems can have serious repercussions when incorporated into crucial applications. AI attacks can potentially increase existing threats, introduce new ones, and change how threats typically behave. AI attacks can also take the shape of attacks that target various algorithmic flaws or various environmental inputs.

    - Advertisement -

    MORE TO EXPLORE

    AI hallucinations

    AI hallucinations and the future of trust: Insights from Dr. Ja-Naé Duane on navigating...

    0
    As artificial intelligence continues to shape the future of work, education, and human interaction, so too does concern over its limitations, including the rise...
    ai patents

    Can AI inventions be patented? Navigating the complex landscape of AI patentability

    0
    Artificial intelligence is not just a futuristic concept—it’s already reshaping industries ranging from healthcare and finance to transportation and education. As the capabilities of...
    robot security

    Can robots be hacked? How to prevent a Robopocalypse and secure our future

    0
    As robots transition from novelty to necessity, weaving themselves into the fabric of modern life—from hospitals and homes to factories and battlefields—their promise is...
    AI models

    Training your own AI model: How to build AI without the hassle

    0
    AI is revolutionizing the way we work, create, and solve problems. But many developers and businesses still assume that building and training a custom...
    meeting

    Top 5 best AI meeting assistants to automate notes, summaries, and action Items

    0
    Meetings are the heartbeat of any organization—where strategy takes shape, ideas evolve, and decisions are made. Yet, they’re also where crucial details often get...
    - Advertisement -