usage pattern monitoring for the misuse of artificial
play

Usage Pattern Monitoring for the misuse of Artificial Intelligence - PowerPoint PPT Presentation

Usage Pattern Monitoring for the misuse of Artificial Intelligence as a Service Seyyed Ahmad Javadi Postdoctoral Researcher Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of


  1. Usage Pattern Monitoring for the misuse of ‘Artificial Intelligence as a Service’ Seyyed Ahmad Javadi Postdoctoral Researcher Compliant and Accountable Systems Research Group Department of Computer Science & Technology, University of Cambridge MSN, July 9 th 2020 1

  2. ‘Artificial Intelligence as a Service’ Re��e�� Cl��d ����ide� AI �e���ce API� Tenan�� Re�����e C���e�c�a� P�e-��a��ed AI ��de�� M�c����f� ��ga���a����� A�a��� C����� AI ��de�� P�b��c �ec��� G��g�e b�d�e� A��i�cial In�elligence a� a Se��ice (AIaaS) 2

  3. Example services Category Services Decision Anomaly Detector, Content Moderator, Personalizer Speech Speech to Text, Text to Speech, Speech Translation, Speaker Recognition Language Language Understanding , Text Analytics, Translator Search Bing Autosuggest, Bing Custom Search, Bing Entity Search, Bing Image Search, … Vision Computer Vision, Custom Vision, Face https://azure.microsoft.com/en-us/services/cognitive-services/#api 3

  4. AIaaS Can be Problematic • Cloud providers offer AI services at scale and on demand • Allow out-of-the-box access (i.e., few clicks) to sophisticated technology • AIaaS is a state-of-the-art of technology driving applications • AIaaS might support problematic applications • Human rights challenges (e.g., privacy) • Social implications • Cloud providers do not know what tenants are doing 4

  5. Facial Recognition is Controversial • Microsoft and Amazon offer facial recognition, but not to be used for surveillance (e.g., police department) How service providers know if the offered services are used for harmful purposes? 5

  6. Monitoring for possible AIaaS misuse Re��e�� Ope�a�ional moni�o� AIaaS C�stomers Re�pon�e (tenants) �Capt�re s�stem T�igge� in�e��iga�ion fo� iden�i�ed Mi���e De�ec�ion c���ome�� 6

  7. Misuse Indicators • Misuse indicator • Certain characteristics and criteria of tenant behavior (usage pattern) • In facial recognition context (population surveillance) • Large number of detected faces in short period of time • Larger number of different (unique) detected faces • Generic indicators • Meaningful deviation of observed usage records from the past records • Meaningful deviation of observed usage records from the normal usage 7

  8. We need a taxonomy • There may be a wide range of potential indicators • A taxonomy serves as a starting point to help frame thinking and assist the development of appropriate monitoring methods. 8

  9. Taxonomy for Misuse Indicators Dimension Sample values transaction metadata Audit information source transaction content short-term Audit information source lifetime long-term sensitive (personal information), Audit record sensitivity non-sensitive (e.g., anonymised information) known-condition (signature-based) Misuse detection analysis type anomaly-based tenant-specific Misuse detection analysis granularity across tenants 9

  10. Large number of different faces Face encodings enable fast face verification Intuitive method: Count number of clusters Reduced dimension face encodings 10

  11. Customer’s usage records deviates from normal usage (across tenants) • Looking for types of applications • Looking for outliers 11

  12. Computation time details 12 2500 Computation time (second) Computation time (second) Comparison-based Comparison-based Single-prediction-based Single-prediction-based 10 2000 Multi-prediction-based Multi-prediction-based 8 1500 6 1000 4 500 2 0 0 0 500 1000 0 500 1000 Different face encoding list size Different face encoding list size 12

  13. Conclusion • AIaaS enables out-of-box access to sophisticated technology • Could be problematic if it is used inappropriately • Cloud providers do not know what the tenants are doing • Monitoring AIaaS is crucial to discover potential misuse • Feasibility • Scalability, performance overhead, … • Legal implications • Challenges • Lack of access to real world data • We look for datasets having similarity to request-response model 13

  14. Thank You Seyyed Ahmad Javadi Postdoctoral Researcher ahmad.javadi@cl.cam.ac.uk http://www.compacctsys.net 14

Recommend


More recommend