Movatterモバイル変換


[0]ホーム

URL:


US20240022585A1 - Detecting and responding to malicious acts directed towards machine learning model - Google Patents

Detecting and responding to malicious acts directed towards machine learning model
Download PDF

Info

Publication number
US20240022585A1
US20240022585A1US17/866,051US202217866051AUS2024022585A1US 20240022585 A1US20240022585 A1US 20240022585A1US 202217866051 AUS202217866051 AUS 202217866051AUS 2024022585 A1US2024022585 A1US 2024022585A1
Authority
US
United States
Prior art keywords
machine learning
data
learning model
output
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/866,051
Inventor
Tanner Burns
Chris Sestito
James Ballard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hiddenlayer Inc
Original Assignee
Hiddenlayer Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hiddenlayer IncfiledCriticalHiddenlayer Inc
Priority to US17/866,051priorityCriticalpatent/US20240022585A1/en
Assigned to HiddenLayer, Inc.reassignmentHiddenLayer, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BALLARD, JAMES, Burns, Tanner, Sestito, Chris
Priority to US18/504,995prioritypatent/US11930030B1/en
Publication of US20240022585A1publicationCriticalpatent/US20240022585A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system detects and responds to malicious acts directed towards machine learning models. Data fed into and output by a machine learning model is collected by a sensor. The data fed into the model includes vectorization data, which is generated from raw data provided from a requester, such as for example a stream of timeseries data. The output data may include a prediction or other output generated by the machine learning model in response to receiving the vectorization data. The vectorization data and machine learning model output data are processed to determine whether the machine learning model is being subject to a malicious act (e.g., attack). The output of the processing may indicate an attack score. A response for handling the request by a requester may be selected based on the output that includes the attack score, and the response may be applied to the requestor.

Description

Claims (20)

What is claimed is:
1. A method for monitoring a machine learning-based system for malicious acts, comprising:
receiving vectorization data by a sensor a server, the vectorization data derived from input data intended for a first machine learning model and provided by a requestor;
receiving, by the sensor, an output generated by the machine learning model, the machine learning model generating the output in response to receiving the vectorization data;
transmitting the vectorization data and the output to a processing engine by the sensor;
processing the vectorization data and the output by the processing engine to generate an attack score, the attack score indicating a likelihood of a malicious action towards the machine learning model via the vectorization data; and
applying a response to a request associated with the requestor, the response based at least in part on the attack score, the response applied in place of the output of the first machine learning model.
2. The method ofclaim 1, wherein applying the response includes selecting, by a response engine, a response based on an output by a second machine learning model within the processing engine, the output of the second machine learning model including a prediction of an attack on the first machine learning model.
3. The method ofclaim 1, further comprising collecting the vectorization data by a sensor component, the sensor component transmitting the collected vectorization data to the processing engine on the server.
4. The method ofclaim 3, wherein the sensor component is created in a computing environment that proxies the first machine learning model.
5. The method ofclaim 3, further including:
collecting the output generated by the first machine learning model by the sensor component;
coupling the vectorization data and output by the sensor component; and
transmitting the coupled vectorization data and output to the processing engine by the sensor component.
6. The method ofclaim 3, further including:
intercepting the output of the first machine learning model by a sensor component; and
transmitting a response generated by the sensor to the requestor in place of the output, the response generated based at least in part on the attack score.
7. The method ofclaim 1, further comprising generating an alert based on the attack score.
8. The method ofclaim 1, further comprising reporting attack data to a user through a graphical interface, the attack data based at least in part on the attack score.
9. A non-transitory computer readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for monitoring a machine learning-based system for malicious acts, the method comprising:
receiving vectorization data by a sensor, the vectorization data derived from input data intended for a first machine learning model and provided by a requestor;
receiving, by the sensor, an output generated by the machine learning model, the machine learning model generating the output in response to receiving the vectorization data;
transmitting the vectorization data and the output to a processing engine by the sensor;
processing the vectorization data and the output by the processing engine to generate an attack score, the attack score indicating a likelihood of a malicious action towards the machine learning model via the vectorization data; and
applying a response to a request associated with the requestor, the response based at least in part on the attack score, the response applied in place of the output of the first machine learning model.
10. The non-transitory computer readable storage medium ofclaim 9, wherein applying the response includes selecting, by a response engine, a response based on an output by a second machine learning model within the processing engine, the output of the second machine learning model including a prediction of an attack on the first machine learning model.
11. The non-transitory computer readable storage medium ofclaim 9, the method further comprising collecting the vectorization data by a sensor component, the sensor component transmitting the collected vectorization data to the processing engine on the server.
12. The non-transitory computer readable storage medium ofclaim 11, wherein the sensor component is created in a computing environment that implements the first machine learning model.
13. The non-transitory computer readable storage medium ofclaim 11, the method further including:
collecting the output generated by the first machine learning model by the sensor component;
coupling the vectorization data and output by the sensor component; and
transmitting the coupled vectorization data and output to the processing engine by the sensor component.
14. The non-transitory computer readable storage medium ofclaim 11, the method further including:
intercepting the output of the first machine learning model by a sensor component; and
transmitting a response generated by the sensor to the requestor in place of the output, the response generated based at least in part on the attack score.
15. The non-transitory computer readable storage medium ofclaim 9, the method further comprising generating an alert based on the attack score.
16. The non-transitory computer readable storage medium ofclaim 9, the method further comprising reporting attack data to a user through a graphical interface, the attack data based at least in part on the attack score.
17. A system for monitoring a machine learning-based system for malicious acts, comprising:
one or more servers including a memory and a processor; and
one or more modules stored in the memory and executed by the processor to receive vectorization data, by sensor, the vectorization data derived from input data intended for a first machine learning model and provided by a requestor, receive, by the sensor, an output generated by the machine learning model, the machine learning model generating the output in response to receiving the vectorization data, transmit the vectorization data and the output to a processing engine by the sensor, process the vectorization data and the output by the processing engine to generate an attack score, the attack score indicating a likelihood of a malicious action towards the machine learning model via the vectorization data, and apply a response to a request associated with the requestor, the response based at least in part on the attack score, the response applied in place of the output of the first machine learning model.
18. The system ofclaim 17, wherein applying the response includes selecting, by a response engine, a response based on an output by a second machine learning model within the processing engine, the output of the second machine learning model including a prediction of an attack on the first machine learning model.
19. The system ofclaim 17, the modules further executable to collect the vectorization data by a sensor component, the sensor component transmitting the collected vectorization data to the processing engine on the server.
20. The system ofclaim 19, wherein the sensor component is created in a computing environment that implements the first machine learning model.
US17/866,0512022-07-152022-07-15Detecting and responding to malicious acts directed towards machine learning modelPendingUS20240022585A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US17/866,051US20240022585A1 (en)2022-07-152022-07-15Detecting and responding to malicious acts directed towards machine learning model
US18/504,995US11930030B1 (en)2022-07-152023-11-08Detecting and responding to malicious acts directed towards machine learning models

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US17/866,051US20240022585A1 (en)2022-07-152022-07-15Detecting and responding to malicious acts directed towards machine learning model

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US18/504,995ContinuationUS11930030B1 (en)2022-07-152023-11-08Detecting and responding to malicious acts directed towards machine learning models

Publications (1)

Publication NumberPublication Date
US20240022585A1true US20240022585A1 (en)2024-01-18

Family

ID=89509478

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US17/866,051PendingUS20240022585A1 (en)2022-07-152022-07-15Detecting and responding to malicious acts directed towards machine learning model
US18/504,995ActiveUS11930030B1 (en)2022-07-152023-11-08Detecting and responding to malicious acts directed towards machine learning models

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US18/504,995ActiveUS11930030B1 (en)2022-07-152023-11-08Detecting and responding to malicious acts directed towards machine learning models

Country Status (1)

CountryLink
US (2)US20240022585A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12105844B1 (en)2024-03-292024-10-01HiddenLayer, Inc.Selective redaction of personally identifiable information in generative artificial intelligence model outputs
US12107885B1 (en)2024-04-262024-10-01HiddenLayer, Inc.Prompt injection classifier using intermediate results
US12111926B1 (en)2024-05-202024-10-08HiddenLayer, Inc.Generative artificial intelligence model output obfuscation
US12130943B1 (en)*2024-03-292024-10-29HiddenLayer, Inc.Generative artificial intelligence model personally identifiable information detection and protection
US12130917B1 (en)2024-05-282024-10-29HiddenLayer, Inc.GenAI prompt injection classifier training using prompt attack structures
US12174954B1 (en)2024-05-232024-12-24HiddenLayer, Inc.Generative AI model information leakage prevention
US12229265B1 (en)2024-08-012025-02-18HiddenLayer, Inc.Generative AI model protection using sidecars
US12248883B1 (en)2024-03-142025-03-11HiddenLayer, Inc.Generative artificial intelligence model prompt injection classifier
US12293277B1 (en)2024-08-012025-05-06HiddenLayer, Inc.Multimodal generative AI model protection using sequential sidecars
US12314380B2 (en)2023-02-232025-05-27HiddenLayer, Inc.Scanning and detecting threats in machine learning models
US12328331B1 (en)2025-02-042025-06-10HiddenLayer, Inc.Detection of privacy attacks on machine learning models

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9516053B1 (en)*2015-08-312016-12-06Splunk Inc.Network security threat detection by user/user-entity behavioral analysis
US10121104B1 (en)*2017-11-172018-11-06Aivitae LLCSystem and method for anomaly detection via a multi-prediction-model architecture
US10210036B2 (en)*2015-07-312019-02-19Cisco Technology, Inc.Time series metric data modeling and prediction
US10673880B1 (en)*2016-09-262020-06-02Splunk Inc.Anomaly detection to identify security threats
US20200285737A1 (en)*2019-03-052020-09-10Microsoft Technology Licensing, LlcDynamic cybersecurity detection of sequence anomalies
US10824721B2 (en)*2018-05-222020-11-03International Business Machines CorporationDetecting and delaying effect of machine learning model attacks
US11893111B2 (en)*2019-11-262024-02-06Harman International Industries, IncorporatedDefending machine learning systems from adversarial attacks
US11930039B1 (en)*2021-11-162024-03-12Amazon Technologies, Inc.Metric space modeling of network communication

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2016194909A1 (en)*2015-06-022016-12-08日本電信電話株式会社Access classification device, access classification method, and access classification program
US10193902B1 (en)*2015-11-022019-01-29Deep Instinct Ltd.Methods and systems for malware detection
CN108040073A (en)*2018-01-232018-05-15杭州电子科技大学Malicious attack detection method based on deep learning in information physical traffic system
US11710067B2 (en)*2018-10-102023-07-25Visa International Service AssociationOffline security value determination system and method
IL270116A (en)*2019-10-232021-04-29De Identification Ltd A system and method for identifying and protecting against cyber attacks against classification systems
US11483327B2 (en)*2019-11-172022-10-25Microsoft Technology Licensing, LlcCollaborative filtering anomaly detection explainability
US11310270B1 (en)*2020-10-142022-04-19Expel, Inc.Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10210036B2 (en)*2015-07-312019-02-19Cisco Technology, Inc.Time series metric data modeling and prediction
US9516053B1 (en)*2015-08-312016-12-06Splunk Inc.Network security threat detection by user/user-entity behavioral analysis
US10673880B1 (en)*2016-09-262020-06-02Splunk Inc.Anomaly detection to identify security threats
US10121104B1 (en)*2017-11-172018-11-06Aivitae LLCSystem and method for anomaly detection via a multi-prediction-model architecture
US10824721B2 (en)*2018-05-222020-11-03International Business Machines CorporationDetecting and delaying effect of machine learning model attacks
US20200285737A1 (en)*2019-03-052020-09-10Microsoft Technology Licensing, LlcDynamic cybersecurity detection of sequence anomalies
US11893111B2 (en)*2019-11-262024-02-06Harman International Industries, IncorporatedDefending machine learning systems from adversarial attacks
US11930039B1 (en)*2021-11-162024-03-12Amazon Technologies, Inc.Metric space modeling of network communication

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12314380B2 (en)2023-02-232025-05-27HiddenLayer, Inc.Scanning and detecting threats in machine learning models
US12248883B1 (en)2024-03-142025-03-11HiddenLayer, Inc.Generative artificial intelligence model prompt injection classifier
US12105844B1 (en)2024-03-292024-10-01HiddenLayer, Inc.Selective redaction of personally identifiable information in generative artificial intelligence model outputs
US12130943B1 (en)*2024-03-292024-10-29HiddenLayer, Inc.Generative artificial intelligence model personally identifiable information detection and protection
US12107885B1 (en)2024-04-262024-10-01HiddenLayer, Inc.Prompt injection classifier using intermediate results
US12111926B1 (en)2024-05-202024-10-08HiddenLayer, Inc.Generative artificial intelligence model output obfuscation
US12174954B1 (en)2024-05-232024-12-24HiddenLayer, Inc.Generative AI model information leakage prevention
US12130917B1 (en)2024-05-282024-10-29HiddenLayer, Inc.GenAI prompt injection classifier training using prompt attack structures
US12229265B1 (en)2024-08-012025-02-18HiddenLayer, Inc.Generative AI model protection using sidecars
US12293277B1 (en)2024-08-012025-05-06HiddenLayer, Inc.Multimodal generative AI model protection using sequential sidecars
US12328331B1 (en)2025-02-042025-06-10HiddenLayer, Inc.Detection of privacy attacks on machine learning models

Also Published As

Publication numberPublication date
US20240080333A1 (en)2024-03-07
US11930030B1 (en)2024-03-12

Similar Documents

PublicationPublication DateTitle
US11930030B1 (en)Detecting and responding to malicious acts directed towards machine learning models
CN110413908B (en)Method and device for classifying uniform resource locators based on website content
US10210036B2 (en)Time series metric data modeling and prediction
US10270805B2 (en)System and method thereof for identifying and responding to security incidents based on preemptive forensics
US8707431B2 (en)Insider threat detection
US20220321587A1 (en)Automatic anomaly detection based on api sessions
US20170220663A1 (en)Log Event Summarization for Distributed Server System
CN111221625B (en)File detection method, device and equipment
CN104778415B (en)A kind of leakage-preventing system and method for data based on computer behavior
CN111885007B (en)Information tracing method, device, system and storage medium
US20180183819A1 (en)System to detect machine-initiated events in time series data
US12314380B2 (en)Scanning and detecting threats in machine learning models
US12026255B1 (en)Machine learning model adversarial attack monitoring
JP2022002057A (en) Risk assessment system and risk assessment method
US20210304102A1 (en)Automatically allocating network infrastructure resource usage with key performance indicator
CN110955890B (en)Method and device for detecting malicious batch access behaviors and computer storage medium
CN118509192B (en)Situation awareness processing method, electronic equipment, medium and program product
US10616081B2 (en)Application aware cluster monitoring
US12155679B2 (en)Session based anomaly dectection
US12294603B2 (en)Application security testing based on live traffic
US20230162337A1 (en)Real time local filtering of on-screen images
JP6053646B2 (en) Monitoring device, information processing system, monitoring method, and program
US20240195820A1 (en)Continuous api-based fraud detection using sequences
CN114513369B (en)Deep packet inspection-based internet of things behavior analysis method and system
CN118890217B (en) Information processing method and device

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp