期刊文献+

一种多强度攻击下的对抗逃避攻击集成学习算法 被引量:1

Ensemble Method Against Evasion Attack with Different Strength of Attack
下载PDF
导出
摘要 在对抗性学习中,攻击者在非法目的的驱使下,通过探索分类器的漏洞并利用漏洞,使得恶意样本逃过分类器的检测。目前,对抗性学习已被广泛应用于计算机网络中的入侵检测、垃圾邮件过滤和生物识别等领域。现有研究者仅把现有的集成方法应用在对抗性分类中,并证明了多分类器比单分类器更鲁棒。然而,在对抗性学习中,攻击者的先验信息对分类器的鲁棒性有较大的影响。基于此,通过在学习过程中模拟不同强度的攻击,并增大错分样本的权重,提出的多强度攻击下的对抗逃避攻击集成学习算法可以在保持多分类器准确性的同时提高鲁棒性。将其与Bagging集成的多分类器进行比较,结果表明所提算法具有更强的鲁棒性。最后,分析了算法的收敛性以及参数对算法的影响。 Driven by the illegal purpose,attackers often exploit the vulnerability of the classifier to make the malicious samples free of detection in adversarial learning.At present,adversarial learning has been widely used in computer network intrusion detection,spam filtering,biometrics identification and other fields.Many researchers only apply the existing ensemble methods in adversarial learning,and prove that multiple classi-fiers are more robust than single classifier.However,priori information about the attacker has a great influence on the robustness of the classifier in adversarial learning.Based on this situation,by simulating different strength of attack in learning process and increasing the weight of the misclassified sample,the robustness of the multiple classifiers can be improved with maintaining the accuracy.The experimental results show that the ensemble algorithm against evasion attack with different strength of attack is more robust than Bagging.Finally,the convergence of the algorithm and the influence of parameter on the algorithm were analyzed.
出处 《计算机科学》 CSCD 北大核心 2018年第1期34-38,46,共6页 Computer Science
基金 国家自然科学基金(61672332 61322211 61432011 U1435212) 教育部新世纪优秀人才支持计划(NCET-12-1031) 山西省教育厅高等学校中青年拔尖创新人才支持计划 山西省"三晋学者"特聘教授资助
关键词 对抗性学习 逃避攻击 多分类器 鲁棒性 Adversarial learning Evasion attacks Multiple classifier systems Robustness
  • 相关文献

参考文献2

二级参考文献38

  • 1蔡自兴,李枚毅.多示例学习及其研究现状[J].控制与决策,2004,19(6):607-610. 被引量:12
  • 2黎铭,薛晓冰,周志华.基于多示例学习的中文Web目录页面推荐[J].软件学报,2004,15(9):1328-1335. 被引量:17
  • 3LOWD D,MEEK C.Adversarial learning[C].In Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,ACM Press,2005a:641-647.
  • 4DIETTERICH T G,LATHROP R H,and LOZANO-P′EREZ T.Solving the multiple-instance problem with axis-parallel rectangles[J].Artificial Intelligence Journal,1997,89(1-2):31-71.
  • 5DALVI N,DOMINGOS P,MAUSAM,SANGHAI S,and VERMA D.Adversarial classification[C].In Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,ACM Press,2004:99-108.
  • 6BARRENO M,NELSON B,SEARS R,et al.Can machine learning be secure?[C].In ASIACCS'06:Proceedings of the 2006 ACM Symposium on Information,computer and communications security,New York,NY,USA,2006.ACM Press:16-25.
  • 7LIU W,CHAWLA S.Mining adversarial patterns via regularized loss minimization[J].Machine Learning,2010,81:69-83.
  • 8JORGENSEN Z,ZHOU Y,INGE M.A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters[J].Journal of Machine Learning Research,2008,8:1115-1146.
  • 9SU B,XU C.Not so naive online Bayesian spam filter[C].In:Proceedings of the 21st conference on Innovative Application of Artificial Intelligence(IAAI'09),July 14-16,2009,Pascadena,CA.
  • 10GOODMAN J,TAU YIH W.Online discriminative spam filter training[C].Third Conference on Email and Anti-Spam (CEAS 20006) proceedings.

共引文献26

同被引文献26

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部