Usage Pattern Monitoring for the misuse of Artificial Intelligence - - PowerPoint PPT Presentation

usage pattern monitoring for the misuse of artificial
SMART_READER_LITE
LIVE PREVIEW

Usage Pattern Monitoring for the misuse of Artificial Intelligence - - PowerPoint PPT Presentation

Usage Pattern Monitoring for the misuse of Artificial Intelligence as a Service Seyyed Ahmad Javadi Postdoctoral Researcher Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of


slide-1
SLIDE 1

Usage Pattern Monitoring for the misuse

  • f ‘Artificial Intelligence as a Service’

Seyyed Ahmad Javadi Postdoctoral Researcher

Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of Cambridge MSN, July 9th2020

1

slide-2
SLIDE 2

‘Artificial Intelligence as a Service’

Ceca gaa Ree Ree Tenan Aicial Inelligence a a Seice (AIaaS) Pbc ec bde Pe-aed AI de C AI de AI ece API Mcf Aa Gge Cld ide

2

slide-3
SLIDE 3

Example services

Category Services

Decision

Anomaly Detector, Content Moderator, Personalizer

Speech

Speech to Text, Text to Speech, Speech Translation, Speaker Recognition

Language

Language Understanding , Text Analytics, Translator

Search

Bing Autosuggest, Bing Custom Search, Bing Entity Search, Bing Image Search, …

Vision

Computer Vision, Custom Vision, Face

https://azure.microsoft.com/en-us/services/cognitive-services/#api

3

slide-4
SLIDE 4

AIaaS Can be Problematic

  • Cloud providers offer AI services at scale and on demand
  • Allow out-of-the-box access (i.e., few clicks) to sophisticated technology
  • AIaaS is a state-of-the-art of technology driving applications
  • AIaaS might support problematic applications
  • Human rights challenges (e.g., privacy)
  • Social implications
  • Cloud providers do not know what tenants are doing

4

slide-5
SLIDE 5

Facial Recognition is Controversial

  • Microsoft and Amazon offer facial recognition, but not to be used for

surveillance (e.g., police department)

How service providers know if the offered services are used for harmful purposes?

5

slide-6
SLIDE 6

Monitoring for possible AIaaS misuse

Cstomers (tenants) AIaaS Opeaional monio Ree Repone

Mie Deecion

Tigge ineigaion fo idenied come Captre sstem

6

slide-7
SLIDE 7

Misuse Indicators

  • Misuse indicator
  • Certain characteristics and criteria of tenant behavior (usage pattern)
  • In facial recognition context (population surveillance)
  • Large number of detected faces in short period of time
  • Larger number of different (unique) detected faces
  • Generic indicators
  • Meaningful deviation of observed usage records from the past records
  • Meaningful deviation of observed usage records from the normal usage

7

slide-8
SLIDE 8

We need a taxonomy

  • There may be a wide range of potential indicators
  • A taxonomy serves as a starting point to help frame thinking and

assist the development of appropriate monitoring methods.

8

slide-9
SLIDE 9

Taxonomy for Misuse Indicators

Dimension Sample values Audit information source transaction metadata transaction content Audit information source lifetime short-term long-term Audit record sensitivity sensitive (personal information), non-sensitive (e.g., anonymised information) Misuse detection analysis type known-condition (signature-based) anomaly-based Misuse detection analysis granularity tenant-specific across tenants

9

slide-10
SLIDE 10

Large number of different faces

Face encodings enable fast face verification Intuitive method: Count number of clusters

Reduced dimension face encodings

10

slide-11
SLIDE 11

Customer’s usage records deviates from normal usage (across tenants)

  • Looking for types of applications
  • Looking for outliers

11

slide-12
SLIDE 12

Computation time details

500 1000

Different face encoding list size

2 4 6 8 10 12

Computation time (second)

Comparison-based Single-prediction-based Multi-prediction-based

500 1000

Different face encoding list size

500 1000 1500 2000 2500

Computation time (second)

Comparison-based Single-prediction-based Multi-prediction-based

12

slide-13
SLIDE 13

Conclusion

  • AIaaS enables out-of-box access to sophisticated technology
  • Could be problematic if it is used inappropriately
  • Cloud providers do not know what the tenants are doing
  • Monitoring AIaaS is crucial to discover potential misuse
  • Feasibility
  • Scalability, performance overhead, …
  • Legal implications
  • Challenges
  • Lack of access to real world data
  • We look for datasets having similarity to request-response model

13

slide-14
SLIDE 14

Thank You

Seyyed Ahmad Javadi Postdoctoral Researcher ahmad.javadi@cl.cam.ac.uk http://www.compacctsys.net

14