Analyzing the threat matrix and defense techniques
In this section, let's look at different defense techniques essential for enterprises to proactively manage threats related to adversarial attacks during the following stages:
- Initial research, planning, and system and model design/architecture phase
- ML model training and deployment
- ML model live in production
You will also get learn additional capabilities, expertise, and infrastructure that organizations need to invest in to have a foolproof defense system.
Researching and planning during the system and model design/architecture phase
This phase (Figure 2.1) is related to all actions taken during model design, architectural planning, and conceptualization in which the adversary carries out preliminary investigations, searching to gain knowledge of the victim’s infrastructure, datasets, and models that will enable them to set up their own capabilities for initiating attacks on ML SaaS platforms...