usage pattern monitoring for the misuse of artificial
play

Usage Pattern Monitoring for the misuse of Artificial Intelligence - PowerPoint PPT Presentation

Usage Pattern Monitoring for the misuse of Artificial Intelligence as a Service Seyyed Ahmad Javadi Postdoctoral Researcher Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of


  1. Usage Pattern Monitoring for the misuse of ‘Artificial Intelligence as a Service’ Seyyed Ahmad Javadi Postdoctoral Researcher Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of Cambridge MSN, July 9 th 2020 1

  2. ‘Artificial Intelligence as a Service’ Re��e�� Cl��d ����ide� AI �e���ce API� Tenan�� Re�����e C���e�c�a� P�e-��a��ed AI ��de�� M�c����f� ��ga���a����� A�a��� C����� AI ��de�� P�b��c �ec��� G��g�e b�d�e� A��i�cial In�elligence a� a Se��ice (AIaaS) 2

  3. Example services Category Services Decision Anomaly Detector, Content Moderator, Personalizer Speech Speech to Text, Text to Speech, Speech Translation, Speaker Recognition Language Language Understanding , Text Analytics, Translator Search Bing Autosuggest, Bing Custom Search, Bing Entity Search, Bing Image Search, … Vision Computer Vision, Custom Vision, Face https://azure.microsoft.com/en-us/services/cognitive-services/#api 3

  4. AIaaS Can be Problematic • Cloud providers offer AI services at scale and on demand • Allow out-of-the-box access (i.e., few clicks) to sophisticated technology • AIaaS is a state-of-the-art of technology driving applications • AIaaS might support problematic applications • Human rights challenges (e.g., privacy) • Social implications • Cloud providers do not know what tenants are doing 4

  5. Facial Recognition is Controversial • Microsoft and Amazon offer facial recognition, but not to be used for surveillance (e.g., police department) How service providers know if the offered services are used for harmful purposes? 5

  6. Monitoring for possible AIaaS misuse Re��e�� Ope�a�ional moni�o� AIaaS C�stomers Re�pon�e (tenants) �Capt�re s�stem T�igge� in�e��iga�ion fo� iden�i�ed Mi���e De�ec�ion c���ome�� 6

  7. Misuse Indicators • Misuse indicator • Certain characteristics and criteria of tenant behavior (usage pattern) • In facial recognition context (population surveillance) • Large number of detected faces in short period of time • Larger number of different (unique) detected faces • Generic indicators • Meaningful deviation of observed usage records from the past records • Meaningful deviation of observed usage records from the normal usage 7

  8. We need a taxonomy • There may be a wide range of potential indicators • A taxonomy serves as a starting point to help frame thinking and assist the development of appropriate monitoring methods. 8

  9. Taxonomy for Misuse Indicators Dimension Sample values transaction metadata Audit information source transaction content short-term Audit information source lifetime long-term sensitive (personal information), Audit record sensitivity non-sensitive (e.g., anonymised information) known-condition (signature-based) Misuse detection analysis type anomaly-based tenant-specific Misuse detection analysis granularity across tenants 9

  10. Large number of different faces Face encodings enable fast face verification Intuitive method: Count number of clusters Reduced dimension face encodings 10

  11. Customer’s usage records deviates from normal usage (across tenants) • Looking for types of applications • Looking for outliers 11

  12. Computation time details 12 2500 Computation time (second) Computation time (second) Comparison-based Comparison-based Single-prediction-based Single-prediction-based 10 2000 Multi-prediction-based Multi-prediction-based 8 1500 6 1000 4 500 2 0 0 0 500 1000 0 500 1000 Different face encoding list size Different face encoding list size 12

  13. Conclusion • AIaaS enables out-of-box access to sophisticated technology • Could be problematic if it is used inappropriately • Cloud providers do not know what the tenants are doing • Monitoring AIaaS is crucial to discover potential misuse • Feasibility • Scalability, performance overhead, … • Legal implications • Challenges • Lack of access to real world data • We look for datasets having similarity to request-response model 13

  14. Thank You Seyyed Ahmad Javadi Postdoctoral Researcher ahmad.javadi@cl.cam.ac.uk http://www.compacctsys.net 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend