Adversarial classification using signaling games with an application to phishing detection

被引:5
作者
Figueroa, Nicolas [1 ]
L'Huillier, Gaston [2 ]
Weber, Richard [3 ]
机构
[1] Pontificia Univ Catolica Chile, Inst Econ, Santiago, Chile
[2] Sudo Technol Inc, 530 Oak Grove Ave, Menlo Pk, CA 94025 USA
[3] Univ Chile, Dept Ind Engn, FCFM, Ave Beauchef 851, Santiago, Chile
关键词
Adversarial classification; Signaling games; Perfect Bayesian equilibrium; Incremental learning; Support vector machines; Cybercrime; Phishing filtering; FUZZY;
D O I
10.1007/s10618-016-0459-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In adversarial classification, the interaction between classifiers and adversaries can be modeled as a game between two players. It is natural to model this interaction as a dynamic game of incomplete information, since the classifier does not know the exact intentions of the different types of adversaries (senders). For these games, equilibrium strategies can be approximated and used as input for classification models. In this paper we show how to model such interactions between players, as well as give directions on how to approximate their mixed strategies. We propose perceptron-like machine learning approximations as well as novel Adversary-Aware Online Support Vector Machines. Results in a real-world adversarial environment show that our approach is competitive with benchmark online learning algorithms, and provides important insights into the complex relations among players.
引用
收藏
页码:92 / 133
页数:42
相关论文
共 47 条
  • [1] [Anonymous], 1992, Game Theory for Applied Economists
  • [2] [Anonymous], 1961, PRINCIPLES NEURODYNA
  • [3] [Anonymous], 2011, AS C MACH LEARN
  • [4] [Anonymous], 2012, TECH REP
  • [5] [Anonymous], 2007, ACM P 16 INT C WORLD, DOI DOI 10.1145/1242572.1242660
  • [6] [Anonymous], 1991, Game Theory
  • [7] [Anonymous], 2011, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
  • [8] Basnet R, 2008, STUD FUZZ SOFT COMP, V226, P373, DOI 10.1007/978-3-540-77465-5_19
  • [9] New filtering approaches for phishing email
    Bergholz, Andre
    De Beer, Jan
    Glahn, Sebastian
    Moens, Marie-Francine
    Paass, Gerhard
    Strobel, Siehyun
    [J]. JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) : 7 - 35
  • [10] Bergin A., 2009, P STRAT POL FOR 5 MA, P1