Security Evaluation of Pattern Classifiers under Attack

被引:252
作者
Biggio, Battista [1 ]
Fumera, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
Pattern classification; adversarial classification; performance evaluation; security evaluation; robustness evaluation; ADVERSARIAL; SYSTEMS;
D O I
10.1109/TKDE.2013.57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. Extending pattern classification theory and design methods to adversarial settings is thus a novel and very relevant research direction, which has not yet been pursued in a systematic way. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier's behavior in adversarial environments, and lead to better design choices.
引用
收藏
页码:984 / 996
页数:13
相关论文
共 54 条
  • [1] Adler A, 2005, LECT NOTES COMPUT SC, V3546, P1100
  • [2] [Anonymous], 2006, P 23 INT C MACHINE, DOI DOI 10.1145/1143844.1143889
  • [3] [Anonymous], 2012, DAGSTUHL PERSPECTIVE
  • [4] [Anonymous], 2007, NIPS WORKSHOP MACHIN
  • [5] [Anonymous], 1973, Pattern Classification and Scene Analysis
  • [6] Barreno M., 2006, P 2006 ACM S INFORM, P16
  • [7] The security of machine learning
    Barreno, Marco
    Nelson, Blaine
    Joseph, Anthony D.
    Tygar, J. D.
    [J]. MACHINE LEARNING, 2010, 81 (02) : 121 - 148
  • [8] Security evaluation of biometric authentication systems under real spoofing attacks
    Biggio, B.
    Akhtar, Z.
    Fumera, G.
    Marcialis, G. L.
    Roli, F.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 11 - 24
  • [9] Biggio B., 2011, PROC INT JOINT C BIO, P1, DOI DOI 10.1109/IJCB.2011.6117474
  • [10] Biggio B., 2012, P 29 INT C INT C MAC, P1467