17 Dec 2020

Machine Learning: Automated Dev Ops and Threat Detection

Getting to grips with ML Ops and ML threats.

Words by
Chris Jefferson
Markus Spiske Xekxe Vr0ec Unsplash Scaled

Welcome to ML Ops

Machine Learning (ML) and Artificial Intelligence (AI) is a new technology that is still finding its footing in the commercial sector. Although few systems are touted as a complete solution, there are many new AI/ML based companies that are capitalising on the benefits, and traditional business will need to follow suit.

With the transition of AI and ML to the business and service sectors instead of purely research, a new development domain opened. This was the beginning of ML Ops (DevOps (Development Operations) for Machine Learning), which focuses on the Automation, Reproducibility, Validation, Deployment and Retraining of a machine learning model.

Ml Ops

The Current State of ML Ops

Current MLOps looks to provide an automated framework and method for constant or regular validation of models or applications in the same way that traditional DevOps looks to minimise the time between development and any fixes or changes that are required post-deployment.

In MLOps terms, this consists of design, development, and operations.

This continuous life cycle is aimed at ensuring that models do not become outdated or experience data drift, even after they are deployed in the wild.

Within this lifecycle, MLOps aims to provide solutions for:

  • Model Lifecycle
  • Model Versioning & Iteration
  • Model Monitoring and Management
  • Model Governance.
  • Model Discovery
  • Model Security

(https://www.cognilytica.com/2020/03/03/ml-model-management-and-operations-2020-mlops/)

Currently, the key cloud providers (AWSGoogleMicrosoft) provide a mechanism for MLOps as well as dedicated providers such as Valohai, but it is also a methodology aimed at best practices.

The Threat Matrix

In October 2020, Microsoft announced a collaborative partnership with technology leaders, researchers and private industry that was aimed at formalising a methodology for understanding how AI and ML systems can be attacked.

The aim of this project was to foster research and collaboration into a core understanding of these weaknesses that can be addressed by using a Threat Matrix.

Matrix 1024X605

Microsoft/Mitre ML Threat Matrix  

 

The current threat matrix is a research framework for identifying attack methodologies based on case studies that highlight where AI and ML systems are most susceptible. This is an active and evolving framework which utilises a combination of traditional red team attacks to gain access to private information, as well as newer methodologies that are specific to machine learning attacks.

Advai'ing AI

This is the domain that Advai works in. We provide a mechanism to identify data poisoning, flag adversarial attacks in real time, protect sensitive model information, and harden models against Adversarial AI (AAI) attacks, by leveraging our research into potential attack vectors.

Our goal is to identify, understand and mitigate these attacks, and provide a mechanism that allows AI/ML to mature into a trusted platform.

RECOMMENDED PRACTICES

As the threat landscape for AI is still evolving, there is not a definitive set of solutions you can use to prevent attacks. There are, however, core practices you can use to limit the risk of your model being attacked:

DATA
  • Review your training data carefully and curate it.
INPUTS
  • Require an API key to access your models.
  • Limit concurrent executions for users where applicable.
  • Use input pre-processing to transform inputs before model processing.
OUTPUTS
  • Watermark outputs, where possible.
  • Do not expose scoring information.
  • Add Gaussian noise to outputs
REVIEW AND TRAIN
  • Periodically review the output with a human user.
  • Retrain models with new data at regular intervals.

 

WHY MLOPS IS NOT ENOUGH

MLOps is a welcome addition, but is ultimately limited in its scope as it still looks at a more traditional approach to development of systems, rather than the systems and datasets themselves.

AI and ML applications, depending on how they are implemented, use a combination of complex algorithms, optimisation functions, multi-dimensional vectors, reinforcement, or hybrid methodologies.  These complex systems are susceptible to Adversarial AI/ML attacks – imperceptible manipulations of inputs or training data that change the system’s decisions or confusion it entirely.

What’s more, it is also possible to steal models based on how they respond and then use those responses to rebuild the sensitive training data that was used to create them or recreate their logic. These are all issues not currently addressed by MLOps.

Defending Against Adversarial Attacks

Current MLOPs processes focuses on optimising AI/ML models by reviewing them against:

  • Accuracy, Precision and Robustness
  • Bias Identification
  • Model Drift
  • Explainability

If applied regularly, these techniques can help maintain a robust model but do not resolve the underlying issues that make them vulnerable to attacks for model theft, data theft, denial of service, fraud, or deception. That’s where you probably want help.

If you are interested in talking to us about the work that we’re doing to protect AI/ML systems and whether we can help you, get in touch through our website or by emailing us directly at [email protected]

Back