Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems

Abstract:

Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud data platform in the cyber-physical context.


AUTHORS

Photo of Petri Vähäkainu

Faculty of Information Technology University of Jyväskylä, Jyväskylä
Finland

Petri Vähäkainu is a researcher (MSc. MIT, MSc. (econ.), BSc. (econ.), B. Eng.) in the Finnish Defence Research Agency FDRA and cybersecurity doctoral student in Faculty of Information Technology at the University Jyväskylä, Finland. He has been researching utilization of Artificial Intelligence in cybersecurity, data science, health care, and Structural Health Monitoring.

Dr. Martti Lehto, PHD

University of Jyväskylä, Jyväskylä
Finland

Dr. Martti Lehto, PhD (Military Sciences), Col (GS) (ret.) works as a cybersecurity professor in the University of Jyväskylä. He has over 30 years of experience in C5ISR Systems in Finnish Defence Forces. He is also adjunct professor at the National Defence University in Air and Cyber Warfare. He has over 200 publications in the areas of C5ISR systems, cyber security and defence, information warfare, artificial intelligence, air power, and defence policy.

 

Photo of Antti Kariluoto

Faculty of Information Technology University of Jyväskylä, Jyväskylä
Finland

Antti Kariluoto researches artificial intelligence and its applicability at the University of Jyväskylä. He is an avid artificial intelligence enthusiast with a passion for data science.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com