publication . Other literature type . Preprint . Article . 2017

Data driven exploratory attacks on black box classifiers in adversarial domains

Tegjyot Singh Sethi; Mehmed Kantardzic;
Open Access
  • Published: 22 Mar 2017
  • Publisher: Elsevier BV
New data driven framework for simulating exploratory attacks on black box classifiers.Algorithms for simple evasion attacks, to more sophisticated reverse engineering attacks.Formal adversarial model and metrics for baseline evaluation of secure learning strategies.Experimental evaluation on 10 datasets, with linear and non-linear defender models.Experimental evaluation on the black box Google Cloud Platform classifier system. While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and...
Persistent Identifiers
free text keywords: Statistics - Machine Learning, Computer Science - Cryptography and Security, Computer Science - Learning, Cognitive Neuroscience, Artificial Intelligence, Computer Science Applications, Machine learning, computer.software_genre, computer, Reverse engineering, business.industry, business, White hat, Data mining, Black box (phreaking), Application domain, Data-driven, Black box, Adversarial machine learning, Cloud computing, Computer science
Related Organizations
51 references, page 1 of 4

Abramson, M., 2015. Toward adversarial online learning and the science of deceptive machines. In: 2015 AAAI Fall Symposium Series.

Akhtar, Z., Biggio, B., Fumera, G., Marcialis, G. L., 2011. Robustness of multi-modal biometric systems under realistic spoof attacks against all traits. In: BIOMS 2011. IEEE, pp. 1-6.

Alabdulmohsin, I. M., Gao, X., Zhang, X., 2014. Adding robustness to support vector machines against adversarial reverse engineering. In: Proceedings of 23rd ACM CIKM. ACM, pp. 231-240.

Barreno, M., Nelson, B., Sears, R., Joseph, A. D., Tygar, J. D., 2006. Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security. ACM, pp. 16-25.

Biggio, B., Corona, I., Maiorca, D., Nelson, B., Sˇ rndic´, N., Laskov, P., Giacinto, G., Roli, F., 2013. Evasion attacks against machine learning at test time. In: Machine Learning and Knowledge Discovery in Databases. Springer, pp. 387-402. [OpenAIRE]

Biggio, B., Fumera, G., Roli, F., 2014a. Pattern recognition systems under attack: Design issues and research challenges. International Journal of Pattern Recognition and Artificial Intelligence 28 (07), 1460002.

Biggio, B., Fumera, G., Roli, F., 2014b. Security evaluation of pattern classifiers under attack. IEEE transactions on knowledge and data engineering 26 (4), 984-996.

Bilge, L., Dumitras, T., 2012. Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp. 833-844. [OpenAIRE]

Breiman, L., 2001. Random forests. Machine learning 45 (1), 5-32.

Chawla, N. V., Bowyer, K. W., Hall, L. O., Kegelmeyer, W. P., 2002. Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research 16, 321-357.

Chen, J., Xin, B., Peng, Z., Dou, L., Zhang, J., 2009. Optimal contraction theorem for exploration-exploitation tradeo in search and optimization. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 39 (3), 680-691.

Cover, T. M., Hart, P. E., 1967. Nearest neighbor pattern classification. Information Theory, IEEE Transactions on 13 (1), 21-27. [OpenAIRE]

DSouza, D. F., 2014. Avatar captcha: telling computers and humans apart via face classification and mouse dynamics. Electronic Theses and Dissertations-1715.

Group, B. D. W., et al., 2013. Big data analytics for security intelligence. Cloud Security Alliance.

Guerra, P. H. C., , et al., 2010. Exploring the spam arms race to characterize spam evolution. In: Proceedings of the 7th Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS). Citeseer.

51 references, page 1 of 4
Any information missing or wrong?Report an Issue