Thông tin tài liệu


Nhan đề : Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly
Tác giả: Liang, F.
Người tham gia: Hatcher, W. G.
Liao, W.
Gao, W.
Yu, W.
Năm xuất bản : 2019
Nhà xuất bản : IEEE Xplore
Số tùng thư/báo cáo: IEEE Access, (2019), Vol 7, pp 158126-158147
Tóm tắt : The advancement of the Internet of Things (IoT) has allowed for unprecedented data collection, automation, and remote sensing and actuation, transforming autonomous systems and bringing smart command and control into numerous cyber physical systems (CPS) that our daily lives depend on. Simultaneously, dramatic improvements in machine learning and deep neural network architectures have enabled unprecedented analytical capabilities, which we see in increasingly common applications and production technologies, such as self-driving vehicles and intelligent mobile applications. Predictably, these technologies have seen rapid adoption, which has left many implementations vulnerable to threats unforeseen or undefended against. Moreover, such technologies can be used by malicious actors, and the potential for cyber threats, attacks, intrusions, and obfuscation that are only just being considered, applied, and countered. In this paper, we consider the good, the bad, and the ugly use of machine learning for cybersecurity and CPS/IoT. In detail, we consider the numerous bene ts (good use) that machine learning has brought, both in general, and speci cally for security and CPS/IoT, such as the improvement of intrusion detection mechanisms and decision accuracy in CPS/IoT. More pressing, we consider the vulnerabilities of machine learning (bad use) from the perspectives of security and CPS/IoT, including the ways in which machine learning systems can be compromised, misled, and subverted at all stages of the machine learning life-cycle (data collection, pre-processing, training, validation, implementation, etc.). Finally, the most concerning, a growing trend has been the utilization of machine learning in the execution of cyberattacks and intrusions (ugly use). Thus, we consider existing mechanisms with the potential to improve target acquisition and existing threat patterns, as well as those that can enable novel attacks yet to be seen.
URI: http://tailieuso.tlu.edu.vn/handle/DHTL/9864
Trong bộ sưu tập: Tài liệu hỗ trợ nghiên cứu khoa học
XEM MÔ TẢ

23

XEM & TẢI

6

Danh sách tệp tin đính kèm:
Ảnh bìa
  • D9864.pdf
      Restricted Access
    • Dung lượng : 2,37 MB

    • Định dạng : Adobe PDF

  • Bạn đọc là cán bộ, giáo viên, sinh viên của Trường Đại học Thuỷ Lợi cần đăng nhập để Xem trực tuyến/Tải về



    Khi sử dụng tài liệu trong thư viện số bạn đọc phải tuân thủ đầy đủ luật bản quyền.