{"id":1008,"date":"2024-06-19T09:00:00","date_gmt":"2024-06-19T08:00:00","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=1008"},"modified":"2024-06-16T11:30:46","modified_gmt":"2024-06-16T10:30:46","slug":"understanding-the-risks-of-large-language-models","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/understanding-the-risks-of-large-language-models\/","title":{"rendered":"Understanding the Risks of Large Language Models"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/ITM-Selling-1024x576.png\" alt=\"\" class=\"wp-image-1009\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/ITM-Selling-1024x576.png 1024w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/ITM-Selling-300x169.png 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/ITM-Selling-768x432.png 768w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/ITM-Selling.png 1280w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n\n\n\n<p>Large Language Models (LLM) have become powerful tools in the field of artificial intelligent, which is rapidly evolving. The models have revolutionized the way we consume and interact with information. They range from content generation to natural language processing. As with all new technologies, there are inherent challenges and risks.<\/p>\n\n\n\n<p>Previously, we have reflected on \u201c<a href=\"https:\/\/www.itminister.co.uk\/blog\/the-machines-are-learning-to-hack-generative-ai-as-the-actor\/\">The Machines Are Learning\u2026 To Hack! Generative AI as the Attacker,<\/a>\u201d where we looked at the risk of GenAI being weaponized by attackers. In this article, we will deep dive on the security landscape surrounding LLMs and RAG systems, outlining potential threats and mitigation strategies.<\/p>\n\n\n\n<p>The potential of adversarial attack is a major concern when it comes to LLMs. They can exploit text-processing weaknesses to bypass restrictions and system prompts. The integrity and security LLM systems are threatened by techniques such as &#8220;prompt injection&#8221;, where malicious inputs alter the output.<\/p>\n\n\n\n<p>Security of data is another concern. Data that is contaminated or compromised can produce biased or malicious results. Using sensitive or copyrighted data to train employees raises both ethical and legal issues.<\/p>\n\n\n\n<p>Retrieval-Augmented Generation (RAG) systems are one of the most popular implementations of LLMs. The systems use vector databases and LLMs to extract relevant information, contexts, and data during the creation process. This approach, while it can improve the accuracy and quality of outputs as well as their overall quality, also poses new security risks.<\/p>\n\n\n\n<p><strong>OWASP LLM Top 10<\/strong><\/p>\n\n\n\n<p>OWASP Top 10 Large Language Model Applications (LLM Apps) is a project of OWASP which aims at educating developers, security experts, and organisations about the 10 top security vulnerabilities and risks associated with deploying LLM apps.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"507\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-5.png\" alt=\"\" class=\"wp-image-1012\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-5.png 940w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-5-300x162.png 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-5-768x414.png 768w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/genai.owasp.org\">https:\/\/genai.owasp.org<\/a><\/p>\n\n\n\n<p><strong>OWASP Machine Learning Top 10<\/strong><\/p>\n\n\n\n<p>OWASP Machine Learning Top 10 (OWASP Machine Learning Top 10) is a project of the Open Web Application Security Project. It aims at identifying and raising awareness regarding the 10 top security vulnerabilities and risks associated with Machine Learning (ML) Systems.<\/p>\n\n\n\n<p><a href=\"https:\/\/mltop10.info\">https:\/\/mltop10.info<\/a><\/p>\n\n\n\n<p><strong>The MITRE ATT&amp;CK Framework<\/strong><\/p>\n\n\n\n<p>MITRE AT&amp;CK is a framework that we use to combat threats like these. The framework allows us to categorize and understand the different techniques and tactics used by attackers. MITRE has extended this to AI with ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems), and guides how AI can be attacked and what can be done to defend against them.<\/p>\n\n\n\n<p><a href=\"https:\/\/atlas.mitre.org\">https:\/\/atlas.mitre.org<\/a><\/p>\n\n\n\n<p><strong>NIST\u2019s Role in AI Security<\/strong><\/p>\n\n\n\n<p>The National Institute of Standards and Technology (NIST) provides guidelines for securing AI. Their taxonomy for adversarial machine learning (ML) helps organizations classify and mitigate these risks. NIST\u2019s work is essential because it gives a structured approach to understanding and defending against AI-specific threats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"628\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-4.png\" alt=\"\" class=\"wp-image-1011\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-4.png 940w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-4-300x200.png 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-4-768x513.png 768w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/airc.nist.gov\/home\">https:\/\/airc.nist.gov\/home<\/a><\/p>\n\n\n\n<p><strong>Ragas Framework<\/strong><\/p>\n\n\n\n<p>To secure RAG implementations, it is important that the vector databases and data pipelines used in retrieval are protected. Ragas provides a tool to evaluate Retrieval Augmented Generation pipelines.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.ragas.io\/en\/stable\">https:\/\/docs.ragas.io\/en\/stable<\/a><\/p>\n\n\n\n<p><strong>AI\/ML Vulnerability Database<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/sightline.protectai.com\/vulnerabilities\">https:\/\/sightline.protectai.com\/vulnerabilities<\/a><\/p>\n\n\n\n<p><strong>AI Vulnerability Database (AVID) Taxonomy<\/strong><\/p>\n\n\n\n<p>AVID aims at raising awareness of AI\/ML technology and promoting responsible deployment. This includes details such as vulnerability types, models\/systems affected, impact assessments and possible mitigations.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.avidml.org\">https:\/\/docs.avidml.org<\/a><\/p>\n\n\n\n<p><strong>AI Bill of Material (AIBOM)<\/strong><\/p>\n\n\n\n<p>AIBOMs are a comprehensive documentation that includes the components of an AI system, its data sources, methods, ethical considerations, and other relevant information. They aim to promote transparency, reproducibility, and accountability in AI, as well as responsible AI practices.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.manifestcyber.com\/aibom\">https:\/\/www.manifestcyber.com\/aibom<\/a><\/p>\n\n\n\n<p><strong>GenAI Reference Architecture &amp; Maturity Model<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/dr-arsanjani.medium.com\/\" rel=\"noreferrer noopener\" target=\"_blank\">Ali Arsanjani, PhD,<\/a> provides readers with a reference architectures and maturity model that is comprehensive, yet easy to understand, allowing them to get beyond the hype cycle in order build effective solutions.<\/p>\n\n\n\n<p><strong>AI Attack Surface Map<\/strong><\/p>\n\n\n\n<p>Provides a visual map to understand attacks on AI and AI-based systems<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"528\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-3.png\" alt=\"\" class=\"wp-image-1010\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-3.png 940w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-3-300x169.png 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-3-768x431.png 768w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/danielmiessler.com\/p\/the-ai-attack-surface-map-v1-0\">https:\/\/danielmiessler.com\/p\/the-ai-attack-surface-map-v1-0<\/a><\/figcaption><\/figure>\n\n\n\n<p>To prevent attacks such as prompt injection or input-based attacks, always validate inputs before sending them to AI systems.<\/p>\n\n\n\n<p><strong><em>Secure Plugin Design<\/em><\/strong>\u200a\u2014\u200aEnsure that any plugins used are built with security and tested thoroughly.<\/p>\n\n\n\n<p><strong><em>Protect Training Data<\/em><\/strong>: Data lineage (<em>an end-to-end view of the data flow, from its source to its destination, including all the intermediate steps and processes it goes through<\/em>) is a great way to ensure that the data used to train AI models are clean, free of malicious influences and have not been tampered with.<\/p>\n\n\n\n<p><strong><em>Security Audits<\/em><\/strong>: Perform regular audits to find and correct vulnerabilities in AI system before it can be exploited.<\/p>\n\n\n\n<p><strong><em>Model Encryption<\/em><\/strong>: Protect AI models from theft by encrypting them, particularly if they are commercially valuable.<\/p>\n\n\n\n<p><strong><em>Access Control<\/em><\/strong>\u200a\u2014\u200aImplement access control measures to limit the interaction of AI systems with unauthorized individuals.<\/p>\n\n\n\n<p><strong>The Importance of Layered Security<\/strong><\/p>\n\n\n\n<p>Multi-layered security is the implementation of multiple defences in different points within the AI\/LLM system. In addition to securing data and models one must also protect the APIs, and the user interfaces that the AI uses in its interactions with users and other systems. Every layer is an extra barrier for attackers.<\/p>\n\n\n\n<p><strong>Future-Proofing AI Security<\/strong><\/p>\n\n\n\n<p>To future-proof AI security, it is important that we stay ahead of the threats by implementing continuous adaptation and research. By investing in continuing education, organizations can keep their security teams up to date with AI trends and best practices.<\/p>\n\n\n\n<p><strong>Collaboration and Knowledge Sharing<\/strong><\/p>\n\n\n\n<p>Collaboration and sharing of knowledge are two effective methods to improve AI security. Participating in industry groups and conferences and exchanging insights with colleagues can help organizations stay up-to-date on new threats.<\/p>\n\n\n\n<p><strong>Concluding Thoughts<\/strong><\/p>\n\n\n\n<p>AI security landscape is constantly changing and complex, but we can prevent these powerful systems being abused with proactive and careful measures. Understanding the threats that AI faces and taking proactive measures to protect them will help to achieve the ultimate goal of ensuring AI benefits society, without it becoming a weapon for harm.<\/p>\n\n\n\n<p>Get in touch to find out more about IT Minister <a href=\"https:\/\/www.itminister.co.uk\/aisecurityassessment.html\">AI and LLM Security assessment<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"146\" height=\"53\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/itminister-logo.png\" alt=\"\" class=\"wp-image-1003\"\/><\/figure>\n<\/div>\n\n\n<h1 class=\"wp-block-heading\">How Can ITM Help You?<\/h1>\n\n\n\n<p id=\"ember717\">IT Minister covers\u00a0all\u00a0aspects\u00a0of Cyber Security including but not limited to\u00a0<a href=\"https:\/\/www.itminister.co.uk\/homecybermanagement.html\">Home cyber Security Managed Solutions<\/a>\u00a0to automated,\u00a0<a href=\"https:\/\/www.itminister.co.uk\/businesscybersecurityservices.html\">Manage Threat Intelligence<\/a>,\u00a0<a href=\"https:\/\/www.itminister.co.uk\/digitalforensics.html\">Digital Forensic Investigations<\/a>,\u00a0<a href=\"https:\/\/www.itminister.co.uk\/penetrationtesting.html\">Penetration Testing<\/a>,\u00a0<a href=\"https:\/\/www.itminister.co.uk\/mobiledevicesecurityassessment.html\">Mobile Device Management<\/a>,\u00a0<a href=\"https:\/\/www.itminister.co.uk\/publiccloudhardening.html\">Cloud Security Best Practice<\/a>\u00a0&amp;\u00a0<a href=\"https:\/\/www.itminister.co.uk\/businesscybersecurityservices.html\">Secure Architecture by Design<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.itminister.co.uk\/cybersecuritytraining.html\">Cyber Security Training<\/a>. Our objective is to support organisations and consumers at every step of their cyber maturity journey.\u00a0<a href=\"https:\/\/www.itminister.co.uk\/contact.html\">Contact Us<\/a>\u00a0for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Large Language Models (LLM) have become powerful tools in the field of artificial intelligent, which is rapidly evolving. The models have revolutionized the way we consume and interact with information. They range from content generation to natural language processing. As with all new technologies, there are inherent challenges and risks. Previously, we have reflected on &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/understanding-the-risks-of-large-language-models\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Understanding the Risks of Large Language Models&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[39,57,31,58],"tags":[],"class_list":["post-1008","post","type-post","status-publish","format-standard","hentry","category-ai-security","category-generative-ai","category-governance","category-threat-modelling"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1008"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1008\/revisions"}],"predecessor-version":[{"id":1017,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1008\/revisions\/1017"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}