Enabling Trust in Deep Learning Models: A Digital Forensics Case Study

被引:15
作者
Aditya, K. [1 ]
Grzonkowski, Slawomir
Lekhac, NhienAn [1 ]
机构
[1] Univ Coll, Sch Comp Sci, Dublin, Ireland
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
Digital Forensics; Deep Learning; Adversarial Attacks; Adversary Testing Framework; Testing Forensics tools;
D O I
10.1109/TrustCom/BigDataSE.2018.00172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, the volume of evidence collected per case is growing exponentially, to address this problem forensics investigators are looking for investigation process with tools built on new technologies like big data, cloud services and Deep Learning (DL) techniques. Consequently, the accuracy of artifacts found also relies on the performance of techniques used, especially DL models. Recently, Deep Neural Nets (DNN) have achieved state of the art performance in the tasks of classification and recognition. In the context of digital forensics, DNN has been applied in the domains of cybercrime investigation such as child abuse investigations, malware classification, steganalysis and image forensics. However, the robustness of DNN models in the context of digital forensics is never studied before. Hence, in this research, we design and implement a domain independent Adversary Testing Framework (ATF) to test security robustness of black-box DNN's. By using ATF, we also methodically test a commercially available DNN service used in forensic investigations and bypass the detection, where published methods fail in control settings.
引用
收藏
页码:1250 / 1255
页数:6
相关论文
共 26 条
[1]  
Akhtar Naveed, 2018, 180100553 ARXIV
[2]  
Alabdulsalam Saad, 2018, ADV DIGITAL FORENSIC, VXIV, P53
[3]  
[Anonymous], ARXIV170804301
[4]  
Barreno Marco, 2006, P 2006 ACM S INFORM, P16
[5]   Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks [J].
Bontemps, Loic ;
Van Loi Cao ;
McDermott, James ;
Nhien-An Le-Khac .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 :141-152
[6]  
Clemens John, 2015, DFRWS 2015 US
[7]  
D 'avino Dario, 2017, IS T INT S EL IM MED, P3
[8]   The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends [J].
Faheem, Muhammad ;
Kechadi, Tahar ;
Nhien An Le-Khac .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2015, 7 (02) :1-19
[9]  
HE KM, 2016, PROC CVPR IEEE, P770, DOI [10.1109/CVPR.2016.90, DOI 10.1109/CVPR.2016.90]
[10]   Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists [J].
Hitchcock, Ben ;
Le-Khac, Nhien-An ;
Scanlon, Mark .
DIGITAL INVESTIGATION, 2016, 16 :S75-S85