{"id":34881,"date":"2024-08-16T10:01:55","date_gmt":"2024-08-16T03:01:55","guid":{"rendered":"http:\/\/jupitek.maudemo.vip\/index.php\/2024\/08\/16\/the-most-common-cyber-attacks-on-machine-learning-applications\/"},"modified":"2024-08-16T10:01:55","modified_gmt":"2024-08-16T03:01:55","slug":"the-most-common-cyber-attacks-on-machine-learning-applications","status":"publish","type":"post","link":"https:\/\/jupitek.maudemo.vip\/index.php\/2024\/08\/16\/the-most-common-cyber-attacks-on-machine-learning-applications\/","title":{"rendered":"C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0o \u1ee9ng d\u1ee5ng Machine Learning"},"content":{"rendered":"<p><a href=\"https:\/\/www.linode.com\/docs\/guides\/history-of-machine-learning\/\">C\u00e1c thu\u1eadt to\u00e1n v\u00e0 m\u00f4 h\u00ecnh Machine Learning (ML)<\/a>&nbsp;thu th\u1eadp m\u1ed9t l\u01b0\u1ee3ng l\u1edbn d\u1eef li\u1ec7u v\u00e0 s\u1eed d\u1ee5ng nh\u1eadn d\u1ea1ng m\u1eabu \u0111\u1ec3 \u0111\u01b0a ra d\u1ef1 \u0111o\u00e1n v\u00e0 \u0111i\u1ec1u ch\u1ec9nh d\u1ef1a tr\u00ean d\u1eef li\u1ec7u \u0111\u00f3. ML h\u1ed7 tr\u1ee3 chatbot, h\u1ec7 th\u1ed1ng \u0111\u1ec1 xu\u1ea5t s\u1ea3n ph\u1ea9m, xe t\u1ef1 l\u00e1i v\u00e0 h\u1ed7 tr\u1ee3 ra quy\u1ebft \u0111\u1ecbnh trong c\u00e1c l\u0129nh v\u1ef1c y t\u1ebf v\u00e0 t\u00e0i ch\u00ednh. Do s\u1ef1 ph\u1ed5 bi\u1ebfn c\u1ee7a c\u00e1c c\u00f4ng c\u1ee5 v\u00e0 khu\u00f4n kh\u1ed5 nh\u01b0&nbsp;<a href=\"https:\/\/www.linode.com\/docs\/guides\/how-to-install-tensorflow\/\">TensorFlow<\/a>&nbsp;v\u00e0&nbsp;<a href=\"https:\/\/www.linode.com\/docs\/guides\/pytorch-installation-ubuntu-2004\/\">PyTorch<\/a>&nbsp;, c\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n hi\u1ec7n c\u00f3 th\u1ec3 th\u00eam ML v\u00e0o \u1ee9ng d\u1ee5ng c\u1ee7a h\u1ecd v\u1edbi \u00edt n\u1ed7 l\u1ef1c h\u01a1n. Tr\u01b0\u1edbc khi b\u1eaft \u0111\u1ea7u Machine Learning, b\u1ea1n n\u00ean bi\u1ebft v\u1ec1 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng Machine Learning ph\u1ed5 bi\u1ebfn nh\u1ea5t. Khi ngh\u0129 v\u1ec1 t\u00ednh b\u1ea3o m\u1eadt c\u1ee7a \u1ee9ng d\u1ee5ng ML, b\u1ea1n ph\u1ea3i c\u00e2n nh\u1eafc c\u00e1c l\u0129nh v\u1ef1c sau:<\/p>\n<ul>\n<li><strong>D\u1eef li\u1ec7u<\/strong>&nbsp;: N\u1ebfu d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n b\u1ecb h\u1ecfng theo b\u1ea5t k\u1ef3 c\u00e1ch n\u00e0o, b\u1ea1n s\u1ebd kh\u00f4ng nh\u1eadn \u0111\u01b0\u1ee3c k\u1ebft qu\u1ea3 h\u1eefu \u00edch \u0111\u00e1ng tin c\u1eady t\u1eeb c\u00e1c m\u00f4 h\u00ecnh Machine Learning c\u1ee7a m\u00ecnh.<\/li>\n<li><strong>\u1ee8ng d\u1ee5ng<\/strong>&nbsp;: Khi m\u1ed9t m\u00f4 h\u00ecnh b\u1ecb h\u1ecfng, ngay c\u1ea3 d\u1eef li\u1ec7u ho\u00e0n h\u1ea3o nh\u1ea5t c\u0169ng \u0111\u01b0a ra k\u1ebft qu\u1ea3 kh\u00f4ng ch\u00ednh x\u00e1c.<\/li>\n<li><strong>\u0110\u1ea7u ra<\/strong>&nbsp;: M\u1ed9t \u1ee9ng d\u1ee5ng ch\u1ec9 t\u1ea1o ra \u0111\u1ea7u ra m\u00e0 n\u00f3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 cung c\u1ea5p. Vi\u1ec7c thay \u0111\u1ed5i m\u1ed9t \u1ee9ng d\u1ee5ng \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c t\u00e1c v\u1ee5 kh\u00e1c v\u1edbi nh\u1eefng g\u00ec n\u00f3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 th\u1ef1c hi\u1ec7n l\u00e0 h\u00e0nh vi s\u1eed d\u1ee5ng sai m\u1ee5c \u0111\u00edch c\u1ee7a \u1ee9ng d\u1ee5ng.<\/li>\n<li><strong>Ng\u01b0\u1eddi d\u00f9ng<\/strong>&nbsp;: Ngay c\u1ea3 khi t\u1ea5t c\u1ea3 c\u00e1c y\u1ebfu t\u1ed1 b\u1ea3o m\u1eadt kh\u00e1c cho \u1ee9ng d\u1ee5ng Machine Learning \u0111\u1ec1u ch\u00ednh x\u00e1c, ng\u01b0\u1eddi d\u00f9ng v\u1eabn c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng ng\u0103n ch\u1eb7n c\u00e1c \u1ee9ng d\u1ee5ng Machine Learning th\u00f4ng qua nhi\u1ec1u c\u00e1ch kh\u00e1c nhau, ch\u1eb3ng h\u1ea1n nh\u01b0 c\u1ed1 t\u00ecnh cung c\u1ea5p d\u1eef li\u1ec7u \u0111\u1ea7u v\u00e0o kh\u00f4ng h\u1ee3p l\u1ec7 ho\u1eb7c hi\u1ec3u sai d\u1eef li\u1ec7u \u0111\u1ea7u ra.<\/li>\n<\/ul>\n<p>H\u01b0\u1edbng d\u1eabn n\u00e0y th\u1ea3o lu\u1eadn v\u1ec1 c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt h\u00e0ng \u0111\u1ea7u m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 g\u1eb7p ph\u1ea3i trong m\u1ed9t d\u1ef1 \u00e1n Machine Learning. M\u1ed9t s\u1ed1 l\u1ed7 h\u1ed5ng n\u00e0y l\u00e0 ph\u1ed5 bi\u1ebfn \u0111\u1ed1i v\u1edbi t\u1ea5t c\u1ea3 c\u00e1c d\u1ef1 \u00e1n ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m, trong khi m\u1ed9t s\u1ed1 kh\u00e1c ch\u1ec9 d\u00e0nh ri\u00eang cho c\u00e1c d\u1ef1 \u00e1n Machine Learning.<\/p>\n<h2 id=\"evasion\">Tr\u1ed1n tr\u00e1nh<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#evasion\"><\/a><\/h2>\n<p>T\u1ea5n c\u00f4ng n\u00e9 tr\u00e1nh l\u00e0 v\u1ea5n \u0111\u1ec1 ph\u1ed5 bi\u1ebfn nh\u1ea5t m\u00e0 c\u00e1c \u1ee9ng d\u1ee5ng Machine Learning ph\u1ea3i \u0111\u1ed1i m\u1eb7t. Cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y t\u00ecm c\u00e1ch s\u1eeda \u0111\u1ed5i d\u1eef li\u1ec7u \u0111\u1ea7u v\u00e0o \u0111\u1ec3 &#8220;l\u1eeba&#8221; c\u00e1c b\u1ed9 ph\u00e2n lo\u1ea1i ML. V\u00ed d\u1ee5, m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e9 tr\u00e1nh th\u00e0nh c\u00f4ng c\u00f3 th\u1ec3 ch\u00e8n m\u1ed9t thu\u1eadt to\u00e1n \u0111\u1ed9c h\u1ea1i v\u00e0o \u1ee9ng d\u1ee5ng c\u1ee7a b\u1ea1n \u0111\u1ec3 s\u1eeda \u0111\u1ed5i m\u1ed9t ch\u00fat h\u00ecnh \u1ea3nh, khi\u1ebfn n\u00f3 b\u1ecb thu\u1eadt to\u00e1n Machine Learning ph\u00e2n lo\u1ea1i sai. M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e9 tr\u00e1nh t\u00ecm c\u00e1ch x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng theo nh\u1eefng c\u00e1ch sau:<\/p>\n<ul>\n<li><strong>T\u1ec7p \u0111\u00ednh k\u00e8m<\/strong>&nbsp;: T\u1ec7p \u0111\u00ednh k\u00e8m c\u00f3 th\u1ec3 ch\u1ee9a m\u00e3 \u0111\u1ed9c h\u1ea1i s\u1ebd \u0111\u01b0\u1ee3c th\u1ef1c thi ngay khi t\u1ec7p \u0111\u01b0\u1ee3c m\u1edf.<\/li>\n<li><strong>Li\u00ean k\u1ebft<\/strong>&nbsp;: M\u00e3 \u0111\u1ed9c s\u1ebd \u0111\u01b0\u1ee3c th\u1ef1c thi ngay khi t\u00e0i nguy\u00ean \u0111\u01b0\u1ee3c li\u00ean k\u1ebft tr\u1ecf t\u1edbi \u0111\u01b0\u1ee3c m\u1edf.<\/li>\n<li><strong>H\u00ecnh \u1ea3nh<\/strong>&nbsp;: Vi\u1ec7c xem h\u00ecnh \u1ea3nh trong thi\u1ebft l\u1eadp email c\u1ee7a ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 k\u00edch ho\u1ea1t m\u00e3 \u0111\u1ed9c.<\/li>\n<li><strong>Gi\u1ea3 m\u1ea1o<\/strong>&nbsp;: Tin t\u1eb7c m\u1ea1o danh m\u1ed9t b\u00ean \u0111\u00e1ng tin c\u1eady.<\/li>\n<li><strong>Sinh tr\u1eafc h\u1ecdc<\/strong>&nbsp;: S\u1eed d\u1ee5ng m\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1eb7c bi\u1ec7t ho\u1eb7c c\u00e1c k\u1ef9 thu\u1eadt kh\u00e1c, k\u1ebb t\u1ea5n c\u00f4ng s\u1ebd m\u00f4 ph\u1ecfng bi\u1ec3u c\u1ea3m khu\u00f4n m\u1eb7t ho\u1eb7c d\u1ea5u v\u00e2n tay \u0111\u1ec3 truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng.<\/li>\n<li><strong>M\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1eb7c bi\u1ec7t<\/strong>&nbsp;: C\u00f3 th\u1ec3 \u0111\u00e0o t\u1ea1o m\u00f4 h\u00ecnh m\u00e1y h\u1ecdc \u0111\u1ec3 l\u00e0m nhi\u1ec5u \u0111\u1ea7u ra c\u1ee7a m\u00f4 h\u00ecnh m\u1ee5c ti\u00eau.<\/li>\n<\/ul>\n<h2 id=\"poisoning\">Ng\u1ed9 \u0111\u1ed9c<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#poisoning\"><\/a><\/h2>\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u1ea7u \u0111\u1ed9c \u0111\u01b0\u1ee3c d\u00e0n d\u1ef1ng b\u1eb1ng c\u00e1ch \u0111\u01b0a th\u00f4ng tin sai l\u1ec7ch v\u00e0o lu\u1ed3ng d\u1eef li\u1ec7u c\u1ee7a \u1ee9ng d\u1ee5ng, v\u1edbi m\u1ee5c \u0111\u00edch t\u1ea1o ra k\u1ebft qu\u1ea3 kh\u00f4ng ch\u00ednh x\u00e1c. C\u00f3 m\u1ed9t s\u1ed1 t\u00ecnh hu\u1ed1ng c\u00f3 th\u1ec3 x\u1ea3y ra \u0111\u1ea7u \u0111\u1ed9c. Sau \u0111\u00e2y l\u00e0 nh\u1eefng t\u00ecnh hu\u1ed1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t:<\/p>\n<ul>\n<li>S\u1eed d\u1ee5ng d\u1eef li\u1ec7u x\u1ea5u trong qu\u00e1 tr\u00ecnh \u0111\u00e0o t\u1ea1o m\u00f4 h\u00ecnh t\u1eeb c\u00e1c ngu\u1ed3n kh\u00f4ng \u0111\u00e1ng tin c\u1eady ho\u1eb7c ch\u01b0a \u0111\u01b0\u1ee3c ki\u1ec3m tra.<\/li>\n<li>Cung c\u1ea5p l\u01b0\u1ee3ng l\u1edbn th\u00f4ng tin \u0111\u1ea7u v\u00e0o b\u1ecb l\u1ec7ch ho\u1eb7c c\u00f3 th\u00e0nh ki\u1ebfn \u200b\u200bsau khi \u0111\u00e0o t\u1ea1o m\u00f4 h\u00ecnh.<\/li>\n<\/ul>\n<p>K\u1ebb t\u1ea5n c\u00f4ng th\u01b0\u1eddng th\u00edch \u1ea9n m\u00ecnh trong tr\u01b0\u1eddng h\u1ee3p n\u00e0y v\u00ec m\u1ee5c ti\u00eau kh\u00f4ng ph\u1ea3i l\u00e0 h\u1ea1 g\u1ee5c h\u1ec7 th\u1ed1ng. Thay v\u00e0o \u0111\u00f3, k\u1ebb t\u1ea5n c\u00f4ng t\u00ecm c\u00e1ch thay \u0111\u1ed5i \u0111\u1ea7u ra theo c\u00e1ch c\u00f3 l\u1ee3i cho k\u1ebb t\u1ea5n c\u00f4ng theo m\u1ed9t c\u00e1ch n\u00e0o \u0111\u00f3.&nbsp;<a href=\"https:\/\/secml.readthedocs.io\/en\/stable\/tutorials\/05-Poisoning.html\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00e1c b\u1ed9 ph\u00e2n lo\u1ea1i SVM<\/a>&nbsp;th\u01b0\u1eddng l\u00e0 tr\u1ecdng t\u00e2m c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng nh\u01b0 v\u1eady v\u00ec k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng ch\u00fang \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c nhi\u1ec7m v\u1ee5 nh\u01b0 v\u1ebd l\u1ea1i ranh gi\u1edbi ch\u00ednh tr\u1ecb ho\u1eb7c b\u00e1n h\u00e0ng ho\u1eb7c \u0111\u1ec3 t\u1ea1o l\u1ee3i th\u1ebf cho m\u1ed9t s\u1ea3n ph\u1ea9m c\u1ee5 th\u1ec3 trong chi\u1ebfn d\u1ecbch b\u00e1n h\u00e0ng.<\/p>\n<h2 id=\"inference\">Suy lu\u1eadn<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#inference\"><\/a><\/h2>\n<p>N\u1ebfu tin t\u1eb7c x\u00e1c \u0111\u1ecbnh \u0111\u01b0\u1ee3c b\u1ea3n ghi n\u00e0o t\u1eeb m\u1ed9t t\u1eadp d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e0o t\u1ea1o m\u00f4 h\u00ecnh Machine Learning, th\u00f4ng tin \u0111\u00f3 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u00ecm l\u1ed7 h\u1ed5ng. M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng suy lu\u1eadn s\u1eed d\u1ee5ng c\u00e1c k\u1ef9 thu\u1eadt khai th\u00e1c d\u1eef li\u1ec7u v\u00e0 ph\u00e2n t\u00edch \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c ki\u1ebfn \u200b\u200bth\u1ee9c v\u1ec1 t\u1eadp d\u1eef li\u1ec7u c\u01a1 b\u1ea3n. Trong h\u1ea7u h\u1ebft c\u00e1c tr\u01b0\u1eddng h\u1ee3p, k\u1ebft qu\u1ea3 t\u1ed1t nh\u1ea5t \u0111\u1ebfn t\u1eeb&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Overfitting\" target=\"_blank\" rel=\"noreferrer noopener\">c\u00e1c m\u00f4 h\u00ecnh \u0111\u01b0\u1ee3c trang b\u1ecb qu\u00e1<\/a>&nbsp;m\u1ee9c. Qu\u00e1 m\u1ee9c x\u1ea3y ra khi m\u1ed9t m\u00f4 h\u00ecnh Machine Learning tu\u00e2n theo c\u00e1c \u0111i\u1ec3m d\u1eef li\u1ec7u g\u1ed1c qu\u00e1 c\u1ea9n th\u1eadn. \u0110i\u1ec1u n\u00e0y gi\u00fap tin t\u1eb7c c\u00f3 th\u1ec3 truy v\u1ea5n m\u1ed9t \u0111i\u1ec3m d\u1eef li\u1ec7u c\u1ee5 th\u1ec3 m\u1ed9t c\u00e1ch t\u01b0\u01a1ng \u0111\u1ed1i d\u1ec5 d\u00e0ng. Hi\u1ec7n t\u1ea1i, vect\u01a1 t\u1ea5n c\u00f4ng n\u00e0y ch\u1ec9 ho\u1ea1t \u0111\u1ed9ng tr\u00ean&nbsp;<a href=\"https:\/\/www.linode.com\/docs\/guides\/introduction-to-machine-learning-training-and-inference#an-introduction-to-training-and-inference\">c\u00e1c m\u00f4 h\u00ecnh h\u1ecdc c\u00f3 gi\u00e1m s\u00e1t<\/a>&nbsp;v\u00e0&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Generative_adversarial_network\" target=\"_blank\" rel=\"noreferrer noopener\">M\u1ea1ng \u0111\u1ed1i ngh\u1ecbch t\u1ea1o sinh (GAN)<\/a>&nbsp;.<\/p>\n<p>Khi tin t\u1eb7c g\u1eedi truy v\u1ea5n \u0111\u1ebfn m\u00f4 h\u00ecnh, m\u00f4 h\u00ecnh s\u1ebd \u0111\u01b0a ra d\u1ef1 \u0111o\u00e1n d\u1ef1a tr\u00ean m\u1ee9c \u0111\u1ed9 tin c\u1eady cho t\u1eebng l\u1edbp m\u00e0 m\u00f4 h\u00ecnh h\u1ed7 tr\u1ee3, cung c\u1ea5p cho tin t\u1eb7c nh\u1eefng hi\u1ec3u bi\u1ebft c\u00f3 gi\u00e1 tr\u1ecb v\u1ec1 \u1ee9ng d\u1ee5ng c\u01a1 b\u1ea3n. Ph\u1ea7n t\u1ec7 nh\u1ea5t c\u1ee7a cu\u1ed9c t\u1ea5n c\u00f4ng c\u1ee5 th\u1ec3 n\u00e0y l\u00e0&nbsp;<a href=\"https:\/\/medium.com\/disaitek\/demystifying-the-membership-inference-attack-e33e510a0c39\" target=\"_blank\" rel=\"noreferrer noopener\">n\u00f3 th\u01b0\u1eddng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 ch\u1ed1ng l\u1ea1i nh\u1eefng ng\u01b0\u1eddi c\u1ee5 th\u1ec3 v\u00e0 d\u1eef li\u1ec7u c\u1ee7a h\u1ecd<\/a>&nbsp;, ch\u1eb3ng h\u1ea1n nh\u01b0 h\u1ed3 s\u01a1 y t\u1ebf c\u1ee7a h\u1ecd.<\/p>\n<h2 id=\"trojans\">Trojan<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#trojans\"><\/a><\/h2>\n<p>Trojan s\u1eed d\u1ee5ng nhi\u1ec1u k\u1ef9 thu\u1eadt kh\u00e1c nhau \u0111\u1ec3 t\u1ea1o m\u00e3 ho\u1eb7c d\u1eef li\u1ec7u tr\u00f4ng c\u00f3 v\u1ebb h\u1ee3p l\u1ec7, nh\u01b0ng th\u1ef1c ch\u1ea5t \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 chi\u1ebfm quy\u1ec1n \u0111i\u1ec1u khi\u1ec3n \u1ee9ng d\u1ee5ng ho\u1eb7c thao t\u00fang c\u00e1c th\u00e0nh ph\u1ea7n c\u1ee5 th\u1ec3 c\u1ee7a \u1ee9ng d\u1ee5ng. Kh\u00e1i ni\u1ec7m s\u1eed d\u1ee5ng trojan ch\u1ed1ng l\u1ea1i \u1ee9ng d\u1ee5ng \u0111\u00e3 c\u0169 v\u00e0 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng ch\u1ed1ng l\u1ea1i c\u00e1c \u1ee9ng d\u1ee5ng thu\u1ed9c m\u1ecdi lo\u1ea1i. Tuy nhi\u00ean, trong tr\u01b0\u1eddng h\u1ee3p Machine Learning, trojan th\u01b0\u1eddng \u1ea9n v\u00e0 t\u00ecm c\u00e1ch kh\u00e1m ph\u00e1 th\u00eam v\u1ec1 d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c \u1ee9ng d\u1ee5ng Machine Learning s\u1eed d\u1ee5ng, thay v\u00ec th\u1ef1c hi\u1ec7n c\u00e1c t\u00e1c v\u1ee5 c\u00f4ng khai h\u01a1n, ch\u1eb3ng h\u1ea1n nh\u01b0 x\u00f3a t\u1ec7p. C\u00f3 nhi\u1ec1u lo\u1ea1i t\u1ea5n c\u00f4ng trojan, nh\u01b0ng danh s\u00e1ch d\u01b0\u1edbi \u0111\u00e2y ch\u1ee9a m\u1ed9t s\u1ed1 lo\u1ea1i ph\u1ed5 bi\u1ebfn nh\u1ea5t \u0111\u1ed1i v\u1edbi Machine Learning:<\/p>\n<ul>\n<li><strong>Backdoor<\/strong>&nbsp;: T\u1ea1o m\u1ed9t backdoor tr\u00ean m\u00e1y t\u00ednh m\u1ee5c ti\u00eau m\u00e0 hacker c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111i\u1ec1u khi\u1ec3n m\u00e1y t\u00ednh t\u1eeb xa. Truy c\u1eadp t\u1eeb xa cho ph\u00e9p hacker th\u1ef1c hi\u1ec7n b\u1ea5t k\u1ef3 \u0111i\u1ec1u g\u00ec mong mu\u1ed1n, bao g\u1ed3m t\u1ea3i xu\u1ed1ng t\u1eadp d\u1eef li\u1ec7u ho\u1eb7c m\u00f4 h\u00ecnh c\u1ee7a b\u1ea1n, l\u00e0m h\u1ecfng t\u1eadp d\u1eef li\u1ec7u ho\u1eb7c khi\u1ebfn m\u00f4 h\u00ecnh th\u1ef1c hi\u1ec7n theo c\u00e1ch kh\u00f4ng mong mu\u1ed1n.<\/li>\n<li><strong>Banker<\/strong>&nbsp;: T\u1eadp trung v\u00e0o chi\u1ebfn l\u01b0\u1ee3c \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c ho\u1eb7c thao t\u00fang th\u00f4ng tin t\u00e0i ch\u00ednh. Khi xem x\u00e9t kh\u00eda c\u1ea1nh Machine Learning c\u1ee7a Trojan n\u00e0y, b\u1ea1n ph\u1ea3i ngh\u0129 v\u1ec1 c\u00e1c lo\u1ea1i th\u00f4ng tin m\u00e0 Trojan n\u00e0y c\u00f3 th\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c, ch\u1eb3ng h\u1ea1n nh\u01b0 suy lu\u1eadn th\u00e0nh vi\u00ean, \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c d\u1eef li\u1ec7u ho\u1eb7c tr\u1ed1n tr\u00e1nh, \u0111\u1ec3 c\u00f3 kh\u1ea3 n\u0103ng c\u00f3 \u0111\u01b0\u1ee3c th\u00f4ng tin x\u00e1c th\u1ef1c. Tuy nhi\u00ean, m\u1ee5c ti\u00eau lu\u00f4n l\u00e0 b\u1eb1ng c\u00e1ch n\u00e0o \u0111\u00f3 thuy\u1ebft ph\u1ee5c ng\u01b0\u1eddi d\u00f9ng t\u1ea3i xu\u1ed1ng m\u1ed9t t\u1ea3i tr\u1ecdng.<\/li>\n<li><strong>Downloader<\/strong>&nbsp;: Nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c h\u1ec7 th\u1ed1ng \u0111\u00e3 b\u1ecb x\u00e2m ph\u1ea1m v\u00e0 s\u1eed d\u1ee5ng ch\u1ee9c n\u0103ng c\u1ee7a n\u00f3 \u0111\u1ec3 t\u1ea3i xu\u1ed1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i b\u1ed5 sung. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y c\u00f3 th\u1ec3 l\u00e0 b\u1ea5t k\u1ef3 th\u1ee9 g\u00ec, v\u00ec v\u1eady h\u00e3y t\u00ecm ki\u1ebfm b\u1ea5t k\u1ef3 lo\u1ea1i ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng n\u00e0o bao g\u1ed3m b\u1ea5t k\u1ef3 ph\u1ea7n n\u00e0o trong h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n, bao g\u1ed3m c\u1ea3 d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n.<\/li>\n<li><strong>Neural<\/strong>&nbsp;: Nh\u00fang d\u1eef li\u1ec7u \u0111\u1ed9c h\u1ea1i v\u00e0o t\u1eadp d\u1eef li\u1ec7u \u0111\u1ec3 t\u1ea1o ra \u0111i\u1ec1u ki\u1ec7n m\u00e0 h\u00e0nh \u0111\u1ed9ng x\u1ea3y ra d\u1ef1a tr\u00ean s\u1ef1 ki\u1ec7n, nh\u01b0 m\u1ed9t tr\u00ecnh k\u00edch ho\u1ea1t. Trong h\u1ea7u h\u1ebft c\u00e1c tr\u01b0\u1eddng h\u1ee3p, cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eadp trung v\u00e0o vi\u1ec7c thay \u0111\u1ed5i tr\u1ecdng s\u1ed1 c\u1ee7a m\u1ea1ng n\u01a1-ron \u0111\u1ec3 ch\u1ec9 \u00e1p d\u1ee5ng cho m\u1ed9t s\u1ed1 n\u00fat nh\u1ea5t \u0111\u1ecbnh. Lo\u1ea1i Trojan n\u00e0y hi\u1ec7u qu\u1ea3 nh\u1ea5t \u0111\u1ed1i v\u1edbi M\u1ea1ng n\u01a1-ron t\u00edch ch\u1eadp (CNN), m\u1eb7c d\u00f9 nghi\u00ean c\u1ee9u hi\u1ec7n t\u1ea1i cho th\u1ea5y b\u1ea1n c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ed1i v\u1edbi M\u1ea1ng n\u01a1-ron d\u00e0i h\u1ea1n (LSTM) v\u00e0 M\u1ea1ng n\u01a1-ron h\u1ed3i quy (RNN).<\/li>\n<\/ul>\n<h2 id=\"backdoors\">C\u1eeda sau<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#backdoors\"><\/a><\/h2>\n<p>Ki\u1ec3u t\u1ea5n c\u00f4ng n\u00e0y s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng h\u1ec7 th\u1ed1ng, \u1ee9ng d\u1ee5ng ho\u1eb7c lu\u1ed3ng d\u1eef li\u1ec7u \u0111\u1ec3 truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng ho\u1eb7c \u1ee9ng d\u1ee5ng c\u01a1 b\u1ea3n m\u00e0 kh\u00f4ng c\u1ea7n cung c\u1ea5p th\u00f4ng tin x\u00e1c th\u1ef1c b\u1ea3o m\u1eadt b\u1eaft bu\u1ed9c. Tr\u1ecdng t\u00e2m l\u00e0 b\u1ea3n th\u00e2n m\u1ea1ng n\u01a1-ron, thay v\u00ec c\u00e1c \u0111\u1ea7u v\u00e0o \u0111\u01b0\u1ee3c chu\u1ea9n b\u1ecb \u0111\u1eb7c bi\u1ec7t. M\u1eb7c d\u00f9 ki\u1ec3u t\u1ea5n c\u00f4ng n\u00e0y d\u1ef1a tr\u00ean d\u1eef li\u1ec7u, nh\u01b0ng n\u00f3 t\u1eadp trung v\u00e0o vi\u1ec7c l\u00e0m h\u1ecfng m\u1ea1ng n\u01a1-ron, gi\u1ed1ng nh\u01b0 tr\u01b0\u1eddng h\u1ee3p c\u1ee7a trojan. Ki\u1ec3u t\u1ea5n c\u00f4ng c\u1eeda sau d\u1ef1a v\u00e0o vi\u1ec7c k\u1ebb t\u1ea5n c\u00f4ng s\u1eeda \u0111\u1ed5i d\u1eef li\u1ec7u \u0111\u00e0o t\u1ea1o theo m\u1ed9t c\u00e1ch n\u00e0o \u0111\u00f3 \u0111\u1ec3 truy c\u1eadp v\u00e0o m\u00f4 h\u00ecnh, th\u01b0\u1eddng l\u00e0 th\u00f4ng qua m\u1ea1ng n\u01a1-ron c\u01a1 b\u1ea3n. V\u00ec ki\u1ec3u t\u1ea5n c\u00f4ng n\u00e0y r\u1ea5t tinh vi n\u00ean th\u01b0\u1eddng c\u1ea7n m\u1ed9t \u1ee9ng d\u1ee5ng ri\u00eang \u0111\u1ec3 \u0111\u1ecbnh v\u1ecb v\u00e0 lo\u1ea1i b\u1ecf n\u00f3.<\/p>\n<h2 id=\"espionage\">Gi\u00e1n \u0111i\u1ec7p<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#espionage\"><\/a><\/h2>\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng gi\u00e1n \u0111i\u1ec7p li\u00ean quan \u0111\u1ebfn vi\u1ec7c \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c ph\u00e2n lo\u1ea1i v\u00e0 nh\u1ea1y c\u1ea3m ho\u1eb7c s\u1edf h\u1eefu tr\u00ed tu\u1ec7 \u0111\u1ec3 gi\u00e0nh l\u1ee3i th\u1ebf tr\u01b0\u1edbc m\u1ed9t c\u00e1 nh\u00e2n, nh\u00f3m ho\u1eb7c t\u1ed5 ch\u1ee9c. V\u1ec1 c\u01a1 b\u1ea3n, lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y li\u00ean quan \u0111\u1ebfn vi\u1ec7c l\u00e9n l\u00fat do&nbsp;<a href=\"https:\/\/wwwfr.uni.lu\/snt\/news_events\/new_machine_learning_methods_prevent_cyber_espionage\" target=\"_blank\" rel=\"noreferrer noopener\">th\u00e1m c\u00e1c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a m\u1ed9t t\u1ed5 ch\u1ee9c \u0111\u1ec3 c\u00f3 \u0111\u01b0\u1ee3c m\u1ed9t k\u1ebft qu\u1ea3 c\u1ee5 th\u1ec3<\/a>&nbsp;. Cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 k\u00e9o d\u00e0i trong nhi\u1ec1u n\u0103m v\u00ec m\u1ee5c ti\u00eau c\u1ee7a k\u1ebb t\u1ea5n c\u00f4ng l\u00e0 kh\u00f4ng b\u1ecb ph\u00e1t hi\u1ec7n c\u00e0ng l\u00e2u c\u00e0ng t\u1ed1t. K\u1ebft qu\u1ea3 c\u1ee7a cu\u1ed9c t\u1ea5n c\u00f4ng th\u01b0\u1eddng c\u0169ng r\u1ea5t tinh vi, ch\u1eb3ng h\u1ea1n nh\u01b0 chuy\u1ec3n h\u01b0\u1edbng m\u1ed9t s\u1ed1, nh\u01b0ng kh\u00f4ng ph\u1ea3i t\u1ea5t c\u1ea3, doanh s\u1ed1 b\u00e1n h\u00e0ng sang m\u1ed9t s\u1ea3n ph\u1ea9m c\u1ee5 th\u1ec3. H\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng n\u00e0y c\u00f3 th\u1ec3 nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o d\u1eef li\u1ec7u v\u00e0 m\u00f4 h\u00ecnh Machine Learning. N\u00f3 \u0111\u1ecbnh v\u1ecb d\u1eef li\u1ec7u b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng c\u00e1c m\u00f4 h\u00ecnh d\u1ef1 \u0111o\u00e1n \u0111\u1ec3 xem qua nh\u1eadt k\u00fd \u0111\u1ec3 t\u00ecm c\u00e1c m\u1eabu truy c\u1eadp c\u1ee5 th\u1ec3.<\/p>\n<h2 id=\"sabotage\">S\u1ef1 ph\u00e1 ho\u1ea1i<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#sabotage\"><\/a><\/h2>\n<p>Ph\u00e1 ho\u1ea1i th\u1ef1c hi\u1ec7n c\u00e1c h\u00e0nh \u0111\u1ed9ng c\u1ed1 \u00fd v\u00e0 \u00e1c \u00fd \u0111\u1ec3 ph\u00e1 v\u1ee1 c\u00e1c quy tr\u00ecnh b\u00ecnh th\u01b0\u1eddng, do \u0111\u00f3, ngay c\u1ea3 khi d\u1eef li\u1ec7u kh\u00f4ng b\u1ecb h\u1ecfng, thi\u00ean v\u1ecb ho\u1eb7c b\u1ecb h\u01b0 h\u1ecfng theo m\u1ed9t c\u00e1ch n\u00e0o \u0111\u00f3, c\u00e1c quy tr\u00ecnh c\u01a1 b\u1ea3n c\u0169ng kh\u00f4ng t\u01b0\u01a1ng t\u00e1c v\u1edbi n\u00f3 m\u1ed9t c\u00e1ch ch\u00ednh x\u00e1c. Th\u00f4ng th\u01b0\u1eddng, ph\u00e1 ho\u1ea1i c\u00f3 th\u1ec3 ph\u00e1t hi\u1ec7n \u0111\u01b0\u1ee3c \u1edf m\u1ee9c \u0111\u1ed9 cao, nh\u01b0ng t\u1ea1i th\u1eddi \u0111i\u1ec3m ph\u00e1t hi\u1ec7n, \u0111\u00e3 qu\u00e1 mu\u1ed9n \u0111\u1ec3 l\u00e0m b\u1ea5t c\u1ee9 \u0111i\u1ec1u g\u00ec v\u1ec1 n\u00f3.&nbsp;<a href=\"https:\/\/gizmodo.com\/banks-using-ai-are-ripe-for-russian-sabotage-report-1848687118\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00e1c t\u1ed5 ch\u1ee9c t\u00e0i ch\u00ednh \u0111\u1eb7c bi\u1ec7t d\u1ec5 b\u1ecb ph\u00e1 ho\u1ea1i<\/a>&nbsp;do l\u01b0\u1ee3ng d\u1eef li\u1ec7u kh\u1ed5ng l\u1ed3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ea1o v\u00e0 qu\u1ea3n l\u00fd c\u00e1c m\u00f4 h\u00ecnh. Ngo\u00e0i ra, ph\u00e1 ho\u1ea1i th\u01b0\u1eddng kh\u00f3 kh\u1eafc ph\u1ee5c v\u00ec d\u1eef li\u1ec7u c\u01a1 b\u1ea3n ph\u1ea3i \u0111\u01b0\u1ee3c kh\u1eafc ph\u1ee5c tr\u01b0\u1edbc r\u1ed3i m\u1edbi x\u00e2y d\u1ef1ng l\u1ea1i m\u00f4 h\u00ecnh.<\/p>\n<h2 id=\"fraud\">Gian l\u1eadn<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#fraud\"><\/a><\/h2>\n<p>Gian l\u1eadn x\u1ea3y ra khi tin t\u1eb7c d\u1ef1a v\u00e0o nhi\u1ec1u k\u1ef9 thu\u1eadt kh\u00e1c nhau, ch\u1eb3ng h\u1ea1n nh\u01b0 l\u1eeba \u0111\u1ea3o ho\u1eb7c li\u00ean l\u1ea1c t\u1eeb c\u00e1c ngu\u1ed3n kh\u00f4ng x\u00e1c \u0111\u1ecbnh, \u0111\u1ec3 ph\u00e1 ho\u1ea1i h\u1ec7 th\u1ed1ng, \u1ee9ng d\u1ee5ng ho\u1eb7c b\u1ea3o m\u1eadt d\u1eef li\u1ec7u theo c\u00e1ch b\u00ed m\u1eadt. M\u1ee9c \u0111\u1ed9 truy c\u1eadp n\u00e0y c\u00f3 th\u1ec3 cho ph\u00e9p s\u1eed d\u1ee5ng \u1ee9ng d\u1ee5ng tr\u00e1i ph\u00e9p ho\u1eb7c kh\u00f4ng \u0111\u01b0\u1ee3c tr\u1ea3 ti\u1ec1n v\u00e0 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn c\u00e1ch s\u1eed d\u1ee5ng k\u1ebft qu\u1ea3, ch\u1eb3ng h\u1ea1n nh\u01b0 cung c\u1ea5p d\u1ef1 \u0111o\u00e1n b\u1ea7u c\u1eed sai. May m\u1eafn thay, c\u00f3 r\u1ea5t nhi\u1ec1u nghi\u00ean c\u1ee9u \u0111ang ch\u1edd x\u1eed l\u00fd c\u0169ng s\u1eed d\u1ee5ng&nbsp;<a href=\"https:\/\/spd.group\/machine-learning\/fraud-detection-with-machine-learning\/\" target=\"_blank\" rel=\"noreferrer noopener\">c\u00e1c k\u1ef9 thu\u1eadt Machine Learning \u0111\u1ec3 ph\u00e1t hi\u1ec7n v\u00e0 gi\u00fap gi\u1ea3m thi\u1ec3u gian l\u1eadn<\/a>&nbsp;.<\/p>\n<h2 id=\"conclusion\">Ph\u1ea7n k\u1ebft lu\u1eadn<a href=\"https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/#conclusion\"><\/a><\/h2>\n<p>Tr\u01b0\u1edbc khi th\u00eam ML v\u00e0o d\u1ef1 \u00e1n c\u1ee7a b\u1ea1n, b\u1ea1n n\u00ean bi\u1ebft v\u1ec1 c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng th\u01b0\u1eddng nh\u1eafm v\u00e0o c\u00e1c \u1ee9ng d\u1ee5ng ch\u1ea1y b\u1eb1ng m\u00e1y h\u1ecdc. Tr\u1ed1n tr\u00e1nh, \u0111\u1ea7u \u0111\u1ed9c v\u00e0 suy lu\u1eadn l\u00e0 m\u1ed9t s\u1ed1 lo\u1ea1i t\u1ea5n c\u00f4ng ph\u1ed5 bi\u1ebfn nh\u1ea5t nh\u1eafm v\u00e0o c\u00e1c \u1ee9ng d\u1ee5ng ML. Trojan, c\u1eeda h\u1eadu v\u00e0 gi\u00e1n \u0111i\u1ec7p \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ea5n c\u00f4ng m\u1ecdi lo\u1ea1i \u1ee9ng d\u1ee5ng, nh\u01b0ng ch\u00fang \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng theo nh\u1eefng c\u00e1ch chuy\u00ean bi\u1ec7t \u0111\u1ec3 ch\u1ed1ng l\u1ea1i m\u00e1y h\u1ecdc. B\u00e2y gi\u1edd b\u1ea1n \u0111\u00e3 quen thu\u1ed9c v\u1edbi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng c\u1ea7n ch\u00fa \u00fd, b\u1ea1n c\u00f3 th\u1ec3 b\u1eaft \u0111\u1ea7u t\u1ea1o \u1ee9ng d\u1ee5ng ch\u1ea1y b\u1eb1ng m\u00e1y h\u1ecdc b\u1eb1ng c\u00e1ch&nbsp;<a href=\"https:\/\/www.linode.com\/docs\/guides\/how-to-install-tensorflow\/\">c\u00e0i \u0111\u1eb7t TensorFlow tr\u00ean Ubuntu 20.04<\/a>&nbsp;.<\/p>\n<p>Ngu\u1ed3n : https:\/\/www.linode.com\/docs\/guides\/machine-learning-cyber-attacks\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u00e1c thu\u1eadt to\u00e1n v\u00e0 m\u00f4 h\u00ecnh Machine Learning (ML)&nbsp;thu th\u1eadp m\u1ed9t l\u01b0\u1ee3ng l\u1edbn d\u1eef li\u1ec7u v\u00e0 s\u1eed d\u1ee5ng nh\u1eadn d\u1ea1ng m\u1eabu \u0111\u1ec3 \u0111\u01b0a ra d\u1ef1 \u0111o\u00e1n v\u00e0 \u0111i\u1ec1u ch\u1ec9nh d\u1ef1a tr\u00ean d\u1eef li\u1ec7u \u0111\u00f3. ML h\u1ed7 tr\u1ee3 chatbot, h\u1ec7 th\u1ed1ng \u0111\u1ec1 xu\u1ea5t s\u1ea3n ph\u1ea9m, xe t\u1ef1 l\u00e1i v\u00e0 h\u1ed7 tr\u1ee3 ra quy\u1ebft \u0111\u1ecbnh trong c\u00e1c<\/p>\n","protected":false},"author":1,"featured_media":35516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101],"tags":[],"class_list":["post-34881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data"],"_links":{"self":[{"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/posts\/34881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/comments?post=34881"}],"version-history":[{"count":0,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/posts\/34881\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/media\/35516"}],"wp:attachment":[{"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/media?parent=34881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/categories?post=34881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jupitek.maudemo.vip\/index.php\/wp-json\/wp\/v2\/tags?post=34881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}