Practical Evasion of a Learning-Based Classifier: A Case Study
Top Cited Papers
Open Access
- 1 May 2014
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 197-211
- https://doi.org/10.1109/sp.2014.20
Abstract
Learning-based classifiers are increasingly used for detection of various forms of malicious data. However, if they are deployed online, an attacker may attempt to evade them by manipulating the data. Examples of such attacks have been previously studied under the assumption that an attacker has full knowledge about the deployed classifier. In practice, such assumptions rarely hold, especially for systems deployed online. A significant amount of information about a deployed classifier system can be obtained from various sources. In this paper, we experimentally investigate the effectiveness of classifier evasion using a real, deployed system, PDFrate, as a test case. We develop a taxonomy for practical evasion strategies and adapt known evasion algorithms to implement specific scenarios in our taxonomy. Our experimental results reveal a substantial drop of PDFrate's classification scores and detection accuracy after it is exposed even to simple attacks. We further study potential defense mechanisms against classifier evasion. Our experiments reveal that the original technique proposed for PDFrate is only effective if the executed attack exactly matches the anticipated one. In the discussion of the findings of our study, we analyze some potential techniques for increasing robustness of learning-based systems against adversarial manipulation of data.Keywords
This publication has 32 references indexed in Scilit:
- Evasion Attacks against Machine Learning at Test TimeLecture Notes in Computer Science, 2013
- PeerRush: Mining for Unwanted P2P TrafficLecture Notes in Computer Science, 2013
- Adversarial stylometryACM Transactions on Information and System Security, 2012
- The security of machine learningMachine Learning, 2010
- Learning to classify with missing and corrupted featuresMachine Learning, 2009
- McPAD: A multiple classifier system for accurate payload-based anomaly detectionComputer Networks, 2009
- Language models for detection of unknown attacks in network trafficJournal of Computer Virology and Hacking Techniques, 2006
- Support-vector networksMachine Learning, 1995
- Learning in the Presence of Malicious ErrorsSIAM Journal on Computing, 1993
- On Estimation of a Probability Density Function and ModeThe Annals of Mathematical Statistics, 1962