Share on facebook
Share on linkedin
Share on twitter
Share on facebook
Share on linkedin
Share on twitter

Fighting Fire With Fire: Why AI Is the Best Security Defense for Your AI System

Author | Min Sun, Chief AI Scientist, Appier

Breakthroughs such as deep learning for visual recognition and natural language processing underpin much of the excitement in artificial intelligence (AI) today. However, like all new innovative technologies, AI comes with its share of security concerns. It is always the way: While breakthrough technologies can revolutionize business and the way we work, they have to be handled carefully to avoid errors, misuse or worse.

Thankfully, that very same technology could hold the key to making AI more robust. 

 

A Double-Edge Sword: Why AI’s Biggest Strength Is Also Its Biggest Risk

Remember that any kind of software system has its security concerns – it is not just AI. However, AI has two unique properties that make security more pressing.

The first is its power. AI systems are typically built to increase human productivity – they are much more efficient than humans, especially at performing repetitive tasks. So, if malicious actors were to take control of such a system, their productivity would also greatly increase. This is a double-edged sword – AI’s immense power is its biggest strength, but this also makes it more dangerous if it falls into the wrong hands. 

This danger is magnified as AI becomes more common. In the future, AI systems will become widespread across all kinds of industries. If those tools become controlled by malicious people, that could potentially be a big problem.

The second property is AI’s reliance on data. Most AI systems are data-driven – they need data in order to reach their decisions. That means malicious actors don’t need to take control of an AI system in order to compromise it – they can just manipulate the data instead. If they pollute, alter or compromise the data source, the AI system will become much less effective. So it is not just the AI system that needs protecting, but the source data too.

 

A New Era of Security Threats: Two Types of Attack

So how do malicious actors manipulate the data to attack AI systems? Broadly speaking, there are two types of attack: black box and white box.

In a black box attack, the attacker has no idea what is inside the AI system. That means they need to collect data on it. They need to observe approximately 1,000 examples of the input and output relationship, and depending on this data, they can speculate on what is inside the system and use that to craft an attack. The more data they collect from your AI system, the more likely it is that the attack will be successful. A black box attack is more likely for a system that has been running longer, because the attacker has more examples from which to choose.

In a white box attack, the attacker already knows what is inside including the system architecture, the parameters and so on. They use this knowledge to change the data just enough to throw the system off. This has a much higher rate of success than a black box attack. However, it isn’t easy either, as it requires the attacker to compromise the system in order to fully understand how it works. Only then they can start manipulating the data. You might think it is a little counterintuitive: Once you have hacked into a system, why not just control it directly? That is because a white box attack allows for sustained and long-term malicious use, which can prove more damaging in the long run.

Hackers can also hack a system very quickly and then copy it in its entirety. They won’t control it directly, but they have an identical version they can use themselves. Then they can still craft a white box attack.

 

AI to the Rescue

This all sounds very negative, but there is a silver lining to this particular cloud: AI itself can help protect AI systems from attack.

By studying past attacks using machine learning, you can predict how the system changes its behavior when an attack is imminent. You then create a model that will warn you or shut down the system when certain warning triggers are detected. It is much more efficient than humans looking out for these warning signs. You just need to collect sufficient training data. 

The problem is, new types of attacks are always being created. In this instance, the machine learning approach won’t work, because the system won’t know what to look out for. However, this could soon change. Research is under way on how to train AI to probe your system to see where the vulnerabilities lie. This is a much more proactive approach than recording training data and teaching the system what to look out for.

Currently, a human will define the AI’s action space in order for it to test for vulnerabilities. It is much harder to do that than just collecting training data – that action space can be pretty large, which complicates things significantly. However, in the future this could be fully automated using AI. Then you have all the advantages of AI – like greater efficiency and productivity – with only a minimal increase in cost. 

 

Best Practice

When people think about the dangers associated with AI, they think about movies like The Terminator. Well, don’t worry – we are a long way from that, and AI’s considerable benefits far outweigh the risks.

People and businesses using AI just need to be aware of the security concerns. Like all software, it is good practice to always keep your AI system up to date in order to fix any potential vulnerabilities. You should also be testing your system’s vulnerabilities to see how much data has to be altered in order for the system to fail. Ideally, you want your system to be able to detect any possible change to the data so you can proactively shut it down or switch to a back-up system.

As computer systems become more complicated, it becomes harder for humans to find security vulnerabilities within them. The best human hacker in the world can’t hack a very complex system, but that doesn’t mean the system is flawless. Instead, we should leverage AI to actively probe for vulnerabilities and in turn create more robust systems that better serve our needs.

WE ARE HERE TO HELP

Let us know the marketing challenges that you’re facing, and how you want to improve your marketing strategy.

YOU MIGHT ALSO LIKE

8 Onboarding Techniques You Need to Know for Long-Term App Engagement

It is great that people are installing your app, but install alone doesn’t guarantee your app success: 25 percent of apps are only ever used once. So, how to keep those users sticking around and continuing to engage with your app? Onboarding is not only the start of your relationship with an app user, but also a vital step to building long-term engagement. Think of onboarding as a first impression. Get it right, and you will have a higher chance to keep a customer for the long run. Get it wrong, however, and you might lose that customer forever. So, how to leave that lasting first impression? Here are eight onboarding techniques that can help you get users hooked on to your app for a long term.   1. Simplify Your Sign-Up Process A customer’s time is precious. They don’t want to spend any longer than necessary on digital admin like signing up for a service. If you can simplify the process, perhaps by letting them sign in with their Google or social media account, you will save them time and make them enamored of your brand.   2. Send a Tutorial Loading an app for the first time can

How to Build a Winning Full-Funnel Marketing Strategy

Getting conversions in today’s competitive market is tough. The latest stats show that in March 2020, 88.05 percent of online shopping orders worldwide did not convert into a purchase. One of the reasons for this is that many marketers still focus on a sales-heavy marketing strategy, which is all about pushing people to buy.  The brands that do better are the ones who implement a full-funnel marketing strategy. So, what is a full-funnel strategy and how can you build a winning one? A full-funnel marketing strategy involves tailoring your marketing messages to the particular stage of purchase a customer is currently at. Rather than focusing only on sales, it considers the entire 360-degree customer journey and attempts to nurture relationships and build better brand experiences. A good full-funnel strategy is heavily informed by data. This data, which is collected from a range of internal and external sources, enables you to tailor and optimize your efforts at each stage of the journey. The results are more sales and a greater ROI.   3 Stages of the Marketing Funnel Here we will take a look at each stage of the marketing funnel, what they are, and what you should be focusing on. 

In-App Advertising: What You Need to Consider to Get It Right

In-app advertising is on the rise, especially in Asia Pacific, which accounts for 47 percent of global app downloads. According to a report by Absolute Market Insights, the global in-app advertising market hit US$66.78 billion in 2018 and is expected to grow to US$472.64 billion by 2027. In-app advertising allows advertisers to target customers where they spend their time, and today, this is on mobile devices and apps, with 89 percent of smartphone time being spent on apps – compared to 11 percent for mobile web. It is effective too. In-app ads offer unique reach with the ability to catch people when other media can’t, for example, when they first wake up and on their commute. It also has higher click-through rates – between 1.3 to 2 times higher than mobile web. In addition, in-app ads offer advertisers better targeting, a more contained environment for campaign tracking and increased engagement. However, to create a successful in-app advertising strategy, here are some of the most important aspects you should consider.   1. The Quality of Your Targeting Audience While apps provide you information on users’ past purchases, browsing history, geography and demographics, to get the most out of your in-app ad