SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK
Uloženo v:
| Název: | SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK |
|---|---|
| Autoři: | Deepak, Immani, Ghosh, Ria M |
| Zdroj: | International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709 |
| Informace o vydavateli: | International Journal of Innovative Technology and Research |
| Rok vydání: | 2017 |
| Sbírka: | International Journal of Innovative Technology and Research (IJITR) |
| Témata: | CSE, Data Mining, Java Technology, UML Diagrams, Data Flow Diagram |
| Popis: | Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier’s behavior in adversarial environments, and lead to better design choices |
| Druh dokumentu: | article in journal/newspaper |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://www.ijitr.com/index.php/ojs/article/view/2059/pdf; http://www.ijitr.com/index.php/ojs/article/view/2059 |
| Dostupnost: | http://www.ijitr.com/index.php/ojs/article/view/2059 |
| Rights: | To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places. |
| Přístupové číslo: | edsbas.871ABF7 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://www.ijitr.com/index.php/ojs/article/view/2059# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Deepak%20I Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.871ABF7 RelevancyScore: 865 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 864.807434082031 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Deepak%2C+Immani%22">Deepak, Immani</searchLink><br /><searchLink fieldCode="AR" term="%22Ghosh%2C+Ria+M%22">Ghosh, Ria M</searchLink> – Name: TitleSource Label: Source Group: Src Data: International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709 – Name: Publisher Label: Publisher Information Group: PubInfo Data: International Journal of Innovative Technology and Research – Name: DatePubCY Label: Publication Year Group: Date Data: 2017 – Name: Subset Label: Collection Group: HoldingsInfo Data: International Journal of Innovative Technology and Research (IJITR) – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22CSE%22">CSE</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Mining%22">Data Mining</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Technology%22">Java Technology</searchLink><br /><searchLink fieldCode="DE" term="%22UML+Diagrams%22">UML Diagrams</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Flow+Diagram%22">Data Flow Diagram</searchLink> – Name: Abstract Label: Description Group: Ab Data: Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier’s behavior in adversarial environments, and lead to better design choices – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://www.ijitr.com/index.php/ojs/article/view/2059/pdf; http://www.ijitr.com/index.php/ojs/article/view/2059 – Name: URL Label: Availability Group: URL Data: http://www.ijitr.com/index.php/ojs/article/view/2059 – Name: Copyright Label: Rights Group: Cpyrght Data: To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places. – Name: AN Label: Accession Number Group: ID Data: edsbas.871ABF7 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.871ABF7 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: CSE Type: general – SubjectFull: Data Mining Type: general – SubjectFull: Java Technology Type: general – SubjectFull: UML Diagrams Type: general – SubjectFull: Data Flow Diagram Type: general Titles: – TitleFull: SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Deepak, Immani – PersonEntity: Name: NameFull: Ghosh, Ria M IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2017 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science