网络安全遇上人工智能:综述(英文)

被引:13
作者
Jian-hua LI
机构
[1] SchoolofCyberSecurity,ShanghaiJiaoTongUniversity
关键词
网络安全; 人工智能; 攻击监测; 防御技术;
D O I
暂无
中图分类号
TP393.08 []; TP18 [人工智能理论];
学科分类号
0839 ; 1402 ; 081104 ; 0812 ; 0835 ; 1405 ;
摘要
网络安全与人工智能技术有着广泛的交叉。一方面,可以将人工智能技术(如深度学习)引入网络安全领域,构建智能模型,实现恶意代码检测、入侵检测和威胁情报感知等。另一方面,人工智能模型面临针对样本、学习过程和决策等的各种威胁。因此,人工智能模型需要网络安全防护技术来对抗各类攻击,实现隐私保护机器学习以及安全的联合深度学习等。本文对人工智能与网络安全交叉研究进行综述,首先总结现有利用人工智能技术对抗网络攻击的研究工作,包括采用传统机器学习技术和深度学习技术在对抗网络攻击方面的应用和效果。然后总结和分析人工智能会遭受的对抗攻击,对现有针对对抗攻击的防御方式进行归类,分析各自特点。最后,从构建加密神经网络和实现安全联合深度学习两个方面阐述现有工作中构建安全人工智能系统的方案。
引用
收藏
页码:1462 / 1475
页数:14
相关论文
共 66 条
  • [31] A survey of deep learning:platforms,applications and emerging research trends. Hatcher WG,Yu W. IEEEAccess . 2018
  • [32] Adversarial example defenses:ensembles of weak defenses are not strong. He W,Wei J,Chen XY,et al. https://arxiv.org/abs/ 1706.04701 . 2017
  • [33] Afew-shot deep learning approach for improved intrusion detection. Chowdhury MMU,Hammond F,Konowicz G,et al. Proc 8th Annual Ubiquitous Computing,Electronics and Mobile Communication Conf . 2017
  • [34] Foveation-based mechanisms alleviate adversarial examples. Luo Y,Boix X,Roig G,et al. https://arxiv.org/abs/ 1511.06292 . 2015
  • [35] Intriguing properties of adversarial examples. Cubuk ED,Zoph B,Schoenholz SS,et al. https://arxiv.org/abs/ 1711.02846 . 2017
  • [36] Service popularity-based smart resources partitioning for fog computing-enabled industrial Internet of Things. Li GL,Wu J,Li JH,et al. IEEE Trans Ind Inform . 2018
  • [37] Deep learning for smart industry:efficient manufacture inspection system with fog computing. Li LZ,Ota K,Dong MX. IEEE Trans Ind Inform . 2018
  • [38] Deep NFV:a light-weight framework for intelligent edge network functions virtualization. Li LZ,Ota K,Dong MX. IEEE Network . 2018
  • [39] PhD forum:deep learning-based real-time malware detection with multi-stage analysis. Yuan XY. IEEE Int Conf on Smart Computing . 2017
  • [40] Practical secure aggregation for privacy-preserving machine learning. Bonawitz K,Ivanov V,Kreuter B,et al. Proc ACM SIGSAC Conf on Computer and Communications Security . 2017