3. AI DATA - Shaza - Article thematic Image

Share this article

Facebook
Twitter
LinkedIn

History is a witness to how new technologies have shaped our world. The advent of steam engines, electricity and IT systems has brought diverse opportunities and new challenges that need to be addressed across the world. The onset of the Fourth Industrial Revolution, which marked a new era of novel technologies such as Artificial Intelligence (AI), 3-D printing, and quantum computing, along with others,  had a profound impact on every field of life and blurred the line between the digital and physical world.

With increasing advancements, technology is operating with much less human intervention. Emerging technologies such as AI are transforming the world and its adoption has exploded over the past few years. It is being integrated into nearly every field of our life ranging from social media platforms, search engines, shopping websites, and banking apps to warfare. Machine Learning (ML) and Deep Learning (DL), which are subsets of AI are facilitating autonomy in various fields.

The technological advancement in AI could be attributed to availability of more data and improvements in data increasing processing speed. There is a growing perception that oil is no longer the most valuable resource, rather it is data, reflecting its increasing importance. Data has emerged as a core asset for the emerging digital landscape. However, the same data, which can act as an enabler, could also become a curse if attacked or tampered with. Data poisoning attacks have emerged as one of the prime threats to AI in contemporary times. It is an effective and relatively easier process to sabotage AI. These attacks aim to jeopardize or pollute the training data which is to be used by an ML model. Data poisoning could be done by injecting perturbations in the data sets to be used for training. Given that effectiveness of ML models depends largely on the integrity of the data, poisoning attacks could render ML models ineffective.

Data poisoning impairs the ability of the model to come to the correct conclusions. In addition, during the training processes, these models can pick up biases as a result of the tempered data which is used to train them. A recent example, in this case, is conversational bot – Blenderbot, an AI-driven research project launched by Meta. The bot presented radical and unexpected views regarding people, companies, and politics etc. The same problem was encountered in 2016 when a chat bot launched by Google – Taybot, was forcefully shut down after its inappropriate comments.

Moreover, carefully crafted corrupted data can also be deliberately used to access backdoors for malicious activities. Sensitive data can be retrieved and used against the ML systems themselves. The concerning element is that these attacks can be carried out without being noticed, and every platform which uses training models is prone to such attacks.

The implications of data poisoning could be devastating, given that they can jeopardise both the civilian and military sectors. These attacks pose a threat to the security systems, banking systems, social media management etc. In the military, to the manner in which the advent of gunpowder marked a new era and altered the character of warfare, AI is bringing a transformative impact. Hence, data poisoning attacks against AI systems can bring uncertainty and can adversely impact the data processing systems. In short, they can sabotage every system that relies on more autonomy. Data poisoning is likely to increase sabotage, deception, fraud, exploitation and bring more uncertainty to the world.

Unfortunately, there is no immediate remedy to address this issue. The intensity of an attack depends on various factors such as the attacker’s knowledge of the model, strategy, capability, goal, and robustness of the model. Hence, no single approach can solve this problem, requiring several measures to secure the integrity of the data and avert such attacks.

For the future, to lessen the probability of such attacks, it is necessary to strengthen digital networks via updating firewalls regularly to reduce risk of internal and external threats. There needs to be a stringent verification process for both internally created as well as externally acquired data sets. Open-source data should be used with great caution. Obtaining data, cleaning and labelling is a tiring and expensive process. In order to circumvent it, practitioners often rely on already available data sets. Even though the availability of more data enriches and strengthens the model, the probability that such data has been tampered is greater and increases the likelihood of data poisoning. Lack of employee knowledge could also lead to unintentional situations, but the errors can prove fatal. Hence, there is a greater need to invest in human resource in the concerned organisations. Similarly, techniques such as data compression, denoising, label testing, and perturbation rectifying networks help in securing the integrity of the data, making it less prone to attacks.

Data poisoning attacks remain a concerning element for AI given the latter’s ever-growing applications in different sectors. Hence, the importance of securing data should be a top priority at the national level. There is a dire need to recognize this problem and take necessary measures accordingly to avoid the dangerous circumstances to which it could lead.

Shaza Arif is a Researcher at the Centre for Aerospace & Security Studies (CASS), Islamabad, Pakistan. The article was first published in the News International.

Recent Publications

Browse through the list of recent publications.

India’s Agni-V Test and Its Ramifications for Region

On 11 March 2024, Indian Prime Minister Narendra Modi announced the first successful test launch of the Agni-V Intercontinental Ballistic Missile (ICBM). It featured Multiple Independently Targetable Re-Entry Vehicle (MIRV) technology. The launch was named ‘Mission Divyastra,’ – a reference to the Hindu mythological weapons of ultimate destruction. The test bears testimony to India’s continued endeavours to enhance the reach, precision, and assuredness of its delivery system even at the cost of impacting regional strategic stability. The test also signifies a subtle shift from India’s nuclear doctrine.

17 views

Read More »

بلاکچین: پاکستان کے جمہوری نظام کی جدت، شفافیت، اور سہولت کا مستقبل

جمہوریت کی بنیادوں پر استوار قومیں اپنے مضبوط جمہوری روایت کے ذریعے امن، خوشحالی، اور عدل کی بہترین مثال بنتی ہیں۔ ووٹ کا حق اس جمہوریت کا جوہر ہے، جو عوام کی آواز کو اقتدار تک پہنچاتا ہے اور ایک زندہ جمہوریت کی پہچان ہوتا ہے۔ پاکستان میں انتخابی نظام مہنگا، غیر موثر، اور پرانی ٹیکنالوجی پر مبنی ہے، جو ووٹ کی رازداری اور شفافیت کو برقرار رکھنے میں مشکلات پیدا کرتا ہے۔ اس کے برعکس، بلاکچین ٹیکنالوجی پر مبنی ووٹنگ سسٹم شفافیت، تحفظ، اور کارکردگی کو بہتر بنا سکتا ہے۔ بلاکچین کی مضبوطی ڈیٹا میں تبدیلی یا مداخلت سے تحفظ فراہم کرتی ہے، جو اسے ووٹنگ کے لیے ایک مثالی ٹیکنالوجی بناتی ہے۔ اس سسٹم کی تعمیر اور دیکھ بھال آسان

30 views

Read More »

Pakistan’s Unrealised Remittance Potential

The tide of outward migration from Pakistan surged considerably over the past two years (2022 and 2023), with several millions opting to emigrate with the aim of securing better prospects overseas. For instance, the number of skilled, highly skilled, and highly qualified worker migrants from Pakistan alone increased to 0.77 million, compared to 0.26 million in 2020 and 2021 and 0.48 million during 2018 and 2019, the two years before the pandemic.
  37 views

Read More »

Stay Connected

Follow and Subscribe

Join Our Newsletter
And get notified everytime we publish new content.

© 2022 CASSTT ALL RIGHTS RESERVED

Developed By Team CASSTT

Contact CASS

CASS (Centre for Aerospace & Security Studies), Old Airport Road, Islamabad
+92 51 5405011
cass.thinkers@casstt.com
career@casstt.com

All views and opinions expressed or implied are those of the authors/speakers/internal and external scholars and should not be construed as carrying the official sanction of CASS.