A Game-Theoretic Analysis of Adversarial Classification

被引:30
作者
Dritsoula, Lemonia [1 ,2 ]
Loiseau, Patrick [3 ,4 ]
Musacchio, John [5 ]
机构
[1] Univ Calif Santa Cruz, Santa Cruz, CA 95064 USA
[2] Google, Mountain View, CA 94043 USA
[3] EURECOM, F-06410 Biot, France
[4] MPI SWS, D-66123 Saarbrucken, Germany
[5] Univ Calif Santa Cruz, Dept Technol Management, Santa Cruz, CA 95064 USA
基金
美国国家科学基金会;
关键词
Adversarial classification; game theory; security; Nash equilibrium; threshold strategies; randomization; SECURITY;
D O I
10.1109/TIFS.2017.2718494
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack detection is usually approached as a classification problem. However, standard classification tools often perform poorly, because an adaptive attacker can shape his attacks in response to the algorithm. This has led to the recent interest in developing methods for adversarial classification, but to the best of our knowledge, there have been a very few prior studies that take into account the attacker's tradeoff between adapting to the classifier being used against him with his desire to maintain the efficacy of his attack. Including this effect is a key to derive solutions that perform well in practice. In this investigation, we model the interaction as a game between a defender who chooses a classifier to distinguish between attacks and normal behavior based on a set of observed features and an attacker who chooses his attack features (class 1 data). Normal behavior (class 0 data) is random and exogenous. The attacker's objective balances the benefit from attacks and the cost of being detected while the defender's objective balances the benefit of a correct attack detection and the cost of false alarm. We provide an efficient algorithm to compute all Nash equilibria and a compact characterization of the possible forms of a Nash equilibrium that reveals intuitive messages on how to perform classification in the presence of an attacker. We also explore qualitatively and quantitatively the impact of the non-attacker and underlying parameters on the equilibrium strategies.
引用
收藏
页码:3094 / 3109
页数:16
相关论文
共 57 条
  • [1] Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
  • [2] Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
  • [3] [Anonymous], 2006, P 23 INT C MACHINE, DOI DOI 10.1145/1143844.1143889
  • [4] [Anonymous], 1950, Non-cooperative games
  • [5] [Anonymous], 2010, P 13 INT C ART INT S
  • [6] [Anonymous], 1984, P 16 ANN ACM S THEOR
  • [7] [Anonymous], 1991, Game Theory
  • [8] [Anonymous], 2014, P 2014 SIAM INT C DA
  • [9] [Anonymous], 2011, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
  • [10] Avenhaus R., 2002, HDB GAME THEORY EC A, V3, P1947