Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Artificial Intelligence › IBM Launches Open-source Toolkit to Safeguard AI Systems

    IBM Launches Open-source Toolkit to Safeguard AI Systems

    By Vikram Singh RaoJuly 25, 2018
    Facebook Twitter Reddit LinkedIn
    AI seucity

    On 17th, April 2018, IBM Security announced the launch of an open-source toolkit at the RSA conference in San-Francisco. The Open-Source library entails framework-agnostics software that contains defenses, attacks as well as bench markings to safeguard artificial intelligence systems. This open-source library is also known as Adversarial Robustness Toolbox is designed to assist in protecting Artificial Intelligence system (AI) and Deep Neural Networks (DNNs) into the “Open-Source Community”.

    The toolkit will enable the cyber community and developers to test AI-based security defense against any strong and complex attacks so as to help build resilience as well as dependability into the systems.

    AI systems weakness may be exploited through very indistinct means. With reference to the tech giant; these three actors used to achieve this are often simple, small as well as undetectable alterations in content which may include videos, images, and audio recordings; they can be crafted in order to confuse your AI system. Any small changes in AI system can result in major security problems and impact the performance of your AI systems as well.

    A good example in this scenario is if your AI major task is to control traffic systems; the tricking artificial controllers might make the stop signs to change so as to appear as if it is 70 mph signs. It can be either in the applications of the map or even in one day or physically.

    Open-source community can now use this toolbox as a respiratory as well as the source of information on how to fight threats on the current and future AI systems. The Adversarial Robustness Toolbox focuses on fighting Adversarial AI by recording threat data and assisting developers to create, benchmark and deploy practical defense systems to solve real-world AI.

    Also Read: 5 Best Open Source Frameworks For Developers and Programmers

    Features of the toolbox include:

    • A library
    • Interfaces
    • Metrics

    Introduction of the toolkit to the “open-source” may inspire others to create a solution before the “Adversarial AI” turns to a true threat. The IBM researchers were majorly inspired to develop the AI library due to lack of the needed defense to protect the AI systems, the existing tools didn’t offer enough security needed to secure the AI systems. Therefore, Open-source AI is the first as well as the only AI library that accommodates attacks, defense and also benchmarks so as to implement improved security.

    Other announcements made by the IBM this week include:

    1. The introduction of ML and AI orchestration capabilities in regards to Resilience platform.
    2. The Launch of the “IBM X”. This is a force-threat management services system. They harness the same technologies in-order to analyze as well as detect cyber-security threats for enterprise networks.

    You can now get this toolbox on Github and is readily available for download. Based on our reach so far, for libraries who have tested their AI systems; they have only managed to collect quite a collection of attacks henceforth we still need to apply effective and appropriate defenses in-order to actually improve the AI systems.

    How effective is the toolbox?

    • It uses multiple attacks against AI systems as the security team who are tasked with enhancing the effectiveness of AI system chooses the most effective-defense to fight the attack.
    • It works by trying and tricking the AI with intentionally modified-external data. Though the data which are sent against the AI will be translated to be “fuzzy” and it will make the AI misclassify the data.

    Verdict

    This open-source toolkit is very essential and the cyber-security industry must work as a team since collaborative defense is currently the only available way for both the security teams as well as developers to plan ahead of the “Adversarial AI threats”.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.