A Game Theoretical Vulnerability Analysis of Adversarial Attack

被引:0
作者
Hossain, Khondker Fariha [1 ]
Tavakkoli, Alireza [1 ]
Sengupta, Shamik [1 ]
机构
[1] Univ Nevada, Reno, NV 89557 USA
来源
ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT II | 2022年 / 13599卷
关键词
Adversarial attack; Convolutional neural network; Game theory; CAPTCHA;
D O I
10.1007/978-3-031-20716-7_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent times deep learning has been widely used for automating various security tasks in Cyber Domains. However, adversaries manipulate data in many situations and diminish the deployed deep learning model's accuracy. One notable example is fooling CAPTCHA data to access the CAPTCHA-based Classifier leading to the critical system being vulnerable to cybersecurity attacks. To alleviate this, we propose a computational framework of game theory to analyze the CAPTCHA-based Classifier's vulnerability, strategy, and outcomes by forming a simultaneous two-player game. We apply the Fast Gradient Symbol Method (FGSM) and One Pixel Attack on CAPTCHA Data to imitate real-life scenarios of possible cyber-attack. Subsequently, to interpret this scenario from a Game theoretical perspective, we represent the interaction in the Stackelberg Game in Kuhn tree to study players' possible behaviors and actions by applying our Classifier's actual predicted values. Thus, we interpret potential attacks in deep learning applications while representing viable defense strategies in the game theory prospect.
引用
收藏
页码:369 / 380
页数:12
相关论文
共 15 条
  • [1] Camerer C.F., 2003, BEHAV GAME THEORY EX
  • [2] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [3] Boosting Adversarial Attacks with Momentum
    Dong, Yinpeng
    Liao, Fangzhou
    Pang, Tianyu
    Su, Hang
    Zhu, Jun
    Hu, Xiaolin
    Li, Jianguo
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
  • [4] Fudenberg D., 1992, ECONOMICA, P841
  • [5] Goodfellow IJ, 2015, Arxiv, DOI [arXiv:1412.6572, 10.48550/arXiv.1412.6572]
  • [6] Kingma DP, 2014, ADV NEUR IN, V27
  • [7] Kurakin A., 2016, ARTIF INTELL
  • [8] Madry A, 2019, Arxiv, DOI arXiv:1706.06083
  • [9] MagNet: a Two-Pronged Defense against Adversarial Examples
    Meng, Dongyu
    Chen, Hao
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 135 - 147
  • [10] Myerson RB., 1991, GAME THEORY ANAL CON