Adversarial Machine Learning for Spam Filters

被引:7
作者
Kuchipudi, Bhargav [1 ]
Nannapaneni, Ravi Teja [1 ]
Liao, Qi [1 ]
机构
[1] Cent Michigan Univ, Dept Comp Sci, Mt Pleasant, MI 48859 USA
来源
15TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2020 | 2020年
关键词
Network security; spam detection; adversarial machine learning; artificial intelligence;
D O I
10.1145/3407023.3407079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Email spam filters based on machine learning techniques are widely deployed in today's organizations. As our society relies more on artificial intelligence (AI), the security of AI, especially the machine learning algorithms, becomes increasingly important and remains largely untested. Adversarial machine learning, on the other hand, attempts to defeat machine learning models through malicious input. In this paper, we experiment how adversarial scenario may impact the security of machine learning based mechanisms such as email spam filters. Using natural language processing (NLP) and Baysian model as an example, we developed and tested three invasive techniques, i.e., synonym replacement, ham word injection and spam word spacing. Our adversarial examples and results suggest that these techniques are effective in fooling the machine learning models. The study calls for more research on understanding and safeguarding machine learning based security mechanisms in the presence of adversaries.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
Androutsopoulos Ion, 2000, P WORKSH MACH LEARN, P1
[2]  
[Anonymous], 2008, LEET
[3]  
[Anonymous], 2018, 6 INT C COMP AID DES, V1967
[4]  
Bratko A, 2006, J MACH LEARN RES, V7, P2673
[5]  
Chitti Subramanyam, 2005, IEEE INT C COLL COMP
[6]   A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment [J].
Imam, Niddal H. ;
Vassilakis, Vassilios G. .
ROBOTICS, 2019, 8 (03)
[7]  
Martins Nuno, 2020, Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review, V8, P35403
[8]  
Metsis Vangelis, 2006, 3 C EM ANT CEAS MOUN
[9]  
Pawar K, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), P197, DOI 10.1109/ICRCICN.2015.7434235
[10]  
Peng JY, 2013, INT CONF MACH LEARN, P610, DOI 10.1109/ICMLC.2013.6890364