Modeling security violation processes in machine learning systems
Annotation
The widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the ones occurring in information systems susceptible to malicious influences. The results of modeling events leading to a security breach in machine learning systems operating at critical information infrastructure facilities are presented. For modeling, the technology of creating functional models SADT (Structured Analysis and Design Technique) and the IDEF0 (Integration definition for function modeling) methodology were used as a tool for transition from a verbal functional description of the process under study to a description in terms of mathematical representation. In order to study the scenarios of the transition of machine learning systems to a dangerous state and the numerical assessment of the probability of security violation, mathematical modeling of threats was carried out using the logical-probabilistic method. The authors obtained a visual functional model of system security violation in the form of a context diagram of the system and two levels of decomposition. The hazard function of the system is determined and the arithmetic polynomial of the probability function is derived. In further work the described models will allow researchers to develop methods and algorithms for protecting machine learning systems from malicious influences, as well as to apply them in assessing the level of security.
Keywords
Постоянный URL
Articles in current issue
- On the feasibility of the monostatic scheme for constructing the land-based telescope at supervision of space objects
- DREM procedure application for piecewise constant parameters identification
- Features of the morphology of micro- and nanoporous copper and silver films synthesized by substitution reaction for photocatalytic application.
- Nature-inspired metaheuristic scheduling algorithms in cloud: a systematic review
- Evaluation of the applicability of asynchronous programming methods to the data consistency problem in a microservices environment
- A factor model for detection and recognition of human face contours and elements
- A study of the stability of information and telecommunication networks under conditions of stochastic percolation of nodes
- Context-free path querying with all-path semantics using matrices with sets of intermediate vertices.
- Decision support system for the proton therapy implementation
- Determination of dangerous driving behavior based on the use of information from wearable electronic devices
- An automata-based programming engine
- Bayesian losses for homoscedastic aleatoric uncertainty modeling in pollen image detection
- The speech synthesis detection algorithm based on cepstral coefficients and convolutional neural network
- Risk assessment methodology for information systems, based on the user behavior and IT-security incidents analysis
- Identification of user accounts by image comparison: the pHash-based approach
- A study of human motion in computer vision systems based on a skeletal model
- Solution of super- and hypersonic gas dynamic problems with a model of high-temperature air
- Mathematical modeling of an optimal oncotherapy for malignant tumors.
- A numerical study of the expansion of a gas-particles mixture with axial symmetry.
- The study of the birefrigence modulator based on lithium niobate