SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK

Uloženo v:
Podrobná bibliografie
Název: SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK
Autoři: Deepak, Immani, Ghosh, Ria M
Zdroj: International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709
Informace o vydavateli: International Journal of Innovative Technology and Research
Rok vydání: 2017
Sbírka: International Journal of Innovative Technology and Research (IJITR)
Témata: CSE, Data Mining, Java Technology, UML Diagrams, Data Flow Diagram
Popis: Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier’s behavior in adversarial environments, and lead to better design choices
Druh dokumentu: article in journal/newspaper
Popis souboru: application/pdf
Jazyk: English
Relation: http://www.ijitr.com/index.php/ojs/article/view/2059/pdf; http://www.ijitr.com/index.php/ojs/article/view/2059
Dostupnost: http://www.ijitr.com/index.php/ojs/article/view/2059
Rights: To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
Přístupové číslo: edsbas.871ABF7
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://www.ijitr.com/index.php/ojs/article/view/2059#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Deepak%20I
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.871ABF7
RelevancyScore: 865
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 864.807434082031
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Deepak%2C+Immani%22">Deepak, Immani</searchLink><br /><searchLink fieldCode="AR" term="%22Ghosh%2C+Ria+M%22">Ghosh, Ria M</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: International Journal of Innovative Technology and Research
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2017
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: International Journal of Innovative Technology and Research (IJITR)
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22CSE%22">CSE</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Mining%22">Data Mining</searchLink><br /><searchLink fieldCode="DE" term="%22Java+Technology%22">Java Technology</searchLink><br /><searchLink fieldCode="DE" term="%22UML+Diagrams%22">UML Diagrams</searchLink><br /><searchLink fieldCode="DE" term="%22Data+Flow+Diagram%22">Data Flow Diagram</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier’s behavior in adversarial environments, and lead to better design choices
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: http://www.ijitr.com/index.php/ojs/article/view/2059/pdf; http://www.ijitr.com/index.php/ojs/article/view/2059
– Name: URL
  Label: Availability
  Group: URL
  Data: http://www.ijitr.com/index.php/ojs/article/view/2059
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.871ABF7
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.871ABF7
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: CSE
        Type: general
      – SubjectFull: Data Mining
        Type: general
      – SubjectFull: Java Technology
        Type: general
      – SubjectFull: UML Diagrams
        Type: general
      – SubjectFull: Data Flow Diagram
        Type: general
    Titles:
      – TitleFull: SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Deepak, Immani
      – PersonEntity:
          Name:
            NameFull: Ghosh, Ria M
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2017
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: International Journal of Innovative Technology and Research; Vol 5, No 6 (2017): October - November 2017; 7705-7709
              Type: main
ResultId 1