Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems

AI-generated keywords: Adversarial Machine Learning Video Anomaly Detection Cyber-Attacks Wi-Fi Deauthentication Security Measures

AI-generated Key Points

  • Authors: Furkan Mumcu, Keval Doshi, Yasin Yilmaz from the University of South Florida
  • Focus: Adversarial machine learning attacks against video anomaly detection systems
  • Vulnerability: Surveillance cameras connected to anomaly detection servers via wireless networks
  • Attack method: Wi-Fi deauthentication attack to generate adversarial data for video anomaly detection systems
  • Experimentation: Applying effects like slowing down or reducing resolution on standard benchmark datasets using state-of-the-art models
  • Findings: Attackers can trigger false alarms and conceal physical anomalies, undermining system reliability
  • Tools mentioned: evillimiter for executing Wi-Fi deauthentication attacks effectively
  • Impact: Compromising security measures and hindering accurate detection of genuine anomalies in video surveillance scenarios
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Furkan Mumcu, Keval Doshi, Yasin Yilmaz

License: CC BY 4.0

Abstract: Anomaly detection in videos is an important computer vision problem with various applications including automated video surveillance. Although adversarial attacks on image understanding models have been heavily investigated, there is not much work on adversarial machine learning targeting video understanding models and no previous work which focuses on video anomaly detection. To this end, we investigate an adversarial machine learning attack against video anomaly detection systems, that can be implemented via an easy-to-perform cyber-attack. Since surveillance cameras are usually connected to the server running the anomaly detection model through a wireless network, they are prone to cyber-attacks targeting the wireless connection. We demonstrate how Wi-Fi deauthentication attack, a notoriously easy-to-perform and effective denial-of-service (DoS) attack, can be utilized to generate adversarial data for video anomaly detection systems. Specifically, we apply several effects caused by the Wi-Fi deauthentication attack on video quality (e.g., slow down, freeze, fast forward, low resolution) to the popular benchmark datasets for video anomaly detection. Our experiments with several state-of-the-art anomaly detection models show that the attackers can significantly undermine the reliability of video anomaly detection systems by causing frequent false alarms and hiding physical anomalies from the surveillance system.

Submitted to arXiv on 07 Apr. 2022

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2204.03141v1

In their paper titled "Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems," authors Furkan Mumcu, Keval Doshi, and Yasin Yilmaz from the University of South Florida address the critical issue of anomaly detection in videos within the realm of computer vision. The researchers delve into investigating an innovative adversarial machine learning attack specifically aimed at compromising video anomaly detection systems. They highlight the vulnerability of surveillance cameras connected to anomaly detection servers via wireless networks. The study demonstrates how a Wi-Fi deauthentication attack can be leveraged to generate adversarial data for video anomaly detection systems. By applying various effects induced by the attack on video quality, such as slowing down or reducing resolution, to standard benchmark datasets used for video anomaly detection, the researchers conduct experiments using state-of-the-art models. Their findings reveal that attackers can significantly undermine the reliability of these systems by triggering frequent false alarms and concealing physical anomalies. Furthermore, the paper sheds light on how adversaries can exploit tools like evillimiter to execute Wi-Fi deauthentication attacks effectively. The threat model outlined underscores the potential impact of such attacks on compromising security measures and preventing genuine anomalies from being accurately detected within video surveillance scenarios. This comprehensive exploration not only exposes critical vulnerabilities but also emphasizes the urgent need for robust defenses against adversarial machine learning attacks targeting video anomaly detection systems.
Created on 31 Jan. 2025

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.