ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

Book Cover
Average Rating
Published
Birmingham, UK : Packt Publishing Ltd., 2024.
Status
Available Online

Description

Loading Description...

More Details

Format
Edition
1st edition.
Language
English
ISBN
9781835088678, 1835088678

Notes

Description
Understand how adversarial attacks work against predictive and generative AI, and learn how to safeguard AI and LLM projects with practical examples leveraging OWASP, MITRE, and NIST Key Features Understand the connection between AI and security by learning about adversarial AI attacks Discover the latest security challenges in adversarial AI by examining GenAI, deepfakes, and LLMs Implement secure-by-design methods and threat modeling, using standards and MLSecOps to safeguard AI systems Purchase of the print or Kindle book includes a free PDF eBook Book Description Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies. The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you'll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI. By the end of this book, you'll be able to develop, deploy, and secure AI systems effectively. What you will learn Understand poisoning, evasion, and privacy attacks and how to mitigate them Discover how GANs can be used for attacks and deepfakes Explore how LLMs change security, prompt injections, and data exposure Master techniques to poison LLMs with RAG, embeddings, and fine-tuning Explore supply-chain threats and the challenges of open-access LLMs Implement MLSecOps with CIs, MLOps, and SBOMs Who this book is for This book tackles AI security from both angles - offense and defense. AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. The book also provides a secure-by-design approach for leaders to build AI with security in mind. To get the most out of this book, you'll need a basic understanding of security, ML concepts, and Python.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Sotiropoulos, J. (2024). ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps (1st edition.). Packt Publishing Ltd..

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Sotiropoulos, John. 2024. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps. Birmingham, UK: Packt Publishing Ltd.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Sotiropoulos, John. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps Birmingham, UK: Packt Publishing Ltd, 2024.

Harvard Citation (style guide)

Sotiropoulos, J. (2024). ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with mlsecops. 1st edn. Birmingham, UK: Packt Publishing Ltd.

MLA Citation, 9th Edition (style guide)

Sotiropoulos, John. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps 1st edition., Packt Publishing Ltd., 2024.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
fb76cbb0-fdd7-76f0-7f86-12c81419568e-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDfb76cbb0-fdd7-76f0-7f86-12c81419568e-eng
Full titleadversarial ai attacks mitigations and defense strategies a cybersecurity professionals guide to ai attacks threat modeling and securing ai with mlsecops
Authorsotiropoulos john
Grouping Categorybook
Last Update2025-02-11 03:40:45AM
Last Indexed2025-05-03 03:41:10AM

Book Cover Information

Image Sourcegoogle_isbn
First LoadedDec 30, 2024
Last UsedFeb 26, 2025

Marc Record

First DetectedDec 16, 2024 11:30:23 PM
Last File Modification TimeFeb 11, 2025 03:43:05 AM
SuppressedRecord had no items

MARC Record

LEADER07667cam a22004937a 4500
001on1446416572
003OCoLC
00520250211033926.0
006m     o  d        
007cr |n|||||||||
008240718s2024    enk     o     000 0 eng d
019 |a 1446802072
020 |a 9781835088678|q (electronic bk.)
020 |a 1835088678|q (electronic bk.)
035 |a (OCoLC)1446416572|z (OCoLC)1446802072
037 |a 9781835087985|b O'Reilly Media
037 |a 10769346|b IEEE
040 |a YDX|b eng|c YDX|d OCLCO|d ORMDA|d OCLCO|d EBLCP|d OCLCQ|d IEEEE
049 |a MAIN
050 4|a Q335
08204|a 006.3|2 23/eng/20240805
1001 |a Sotiropoulos, John,|e author.
24510|a ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES|h [electronic resource] :|b a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps /|c John Sotiropoulos.
250 |a 1st edition.
260 |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024.
300 |a 1 online resource
5050 |a Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Adversarial AI -- Chapter 1: Getting Started with AI -- Understanding AI and ML -- Types of ML and the ML life cycle -- Key algorithms in ML -- Neural networks and deep learning -- ML development tools -- Summary -- Further reading -- Chapter 2: Building Our Adversarial Playground -- Technical requirements -- Setting up your development environment -- Python installation -- Creating your virtual environment -- Installing packages
5058 |a Registering your virtual environment with Jupyter notebooks -- Verifying your installation -- Hands-on basic baseline ML -- Simple NNs -- Developing our target AI service with CNNs -- Setup and data collection -- Data exploration -- Data preprocessing -- Algorithm selection and building the model -- Model training -- Model evaluation -- Model deployment -- Inference service -- ML development at scale -- Google Colab -- AWS SageMaker -- Azure Machine Learning services -- Lambda Labs Cloud -- Summary -- Chapter 3: Security and Adversarial AI -- Technical requirements -- Security fundamentals
5058 |a Threat modeling -- Risks and mitigations -- DevSecOps -- Securing our adversarial playground -- Host security -- Network protection -- Authentication -- Data protection -- Access control -- Securing code and artifacts -- Secure code -- Securing dependencies with vulnerability scanning -- Secret scanning -- Securing Jupyter Notebooks -- Securing models from malicious code -- Integrating with DevSecOps and MLOps pipelines -- Bypassing security with adversarial AI -- Our first adversarial AI attack -- Traditional cybersecurity and adversarial AI -- Adversarial AI landscape -- Summary
5058 |a Part 2: Model Development Attacks -- Chapter 4: Poisoning Attacks -- Basics of poisoning attacks -- Definition and examples -- Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning
5058 |a Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations
520 |a Understand how adversarial attacks work against predictive and generative AI, and learn how to safeguard AI and LLM projects with practical examples leveraging OWASP, MITRE, and NIST Key Features Understand the connection between AI and security by learning about adversarial AI attacks Discover the latest security challenges in adversarial AI by examining GenAI, deepfakes, and LLMs Implement secure-by-design methods and threat modeling, using standards and MLSecOps to safeguard AI systems Purchase of the print or Kindle book includes a free PDF eBook Book Description Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies. The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you'll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI. By the end of this book, you'll be able to develop, deploy, and secure AI systems effectively. What you will learn Understand poisoning, evasion, and privacy attacks and how to mitigate them Discover how GANs can be used for attacks and deepfakes Explore how LLMs change security, prompt injections, and data exposure Master techniques to poison LLMs with RAG, embeddings, and fine-tuning Explore supply-chain threats and the challenges of open-access LLMs Implement MLSecOps with CIs, MLOps, and SBOMs Who this book is for This book tackles AI security from both angles - offense and defense. AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. The book also provides a secure-by-design approach for leaders to build AI with security in mind. To get the most out of this book, you'll need a basic understanding of security, ML concepts, and Python.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Artificial intelligence|9 29344
650 0|a Information storage and retrieval systems|x Risk management.
650 0|a Information technology|x Management.|9 78814
650 0|a Data privacy.
650 0|a Data protection.|9 35538
77608|i Print version:|z 1835087981|z 9781835087985|w (OCoLC)1439035560
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781835087985/?ar|x O'Reilly|z eBook
938 |a YBP Library Services|b YANK|n 306543637
938 |a ProQuest Ebook Central|b EBLB|n EBL31529206
994 |a 92|b VIA
999 |c 361136|d 361136