Visible to the public Addressing Adversarial Attacks Against Security Systems Based on Machine Learning

TitleAddressing Adversarial Attacks Against Security Systems Based on Machine Learning
Publication TypeConference Paper
Year of Publication2019
AuthorsApruzzese, G., Colajanni, M., Ferretti, L., Marchetti, M.
Conference Name2019 11th International Conference on Cyber Conflict (CyCon)
Date PublishedMay 2019
PublisherIEEE
ISBN Number978-9949-9904-5-0
Keywordsadversarial attacks, AI Poisoning, Computer crime, cyber detector, cyber security platforms, Deep Learning, Detectors, evasion attacks, Human Behavior, Intrusion detection, invasive software, learning (artificial intelligence), machine learning, machine-learning classifiers, Malware, network intrusion detection, Organizations, pattern classification, poisoning attack, poisoning attacks, pubcrawl, resilience, Resiliency, Scalability, spam
Abstract

Machine-learning solutions are successfully adopted in multiple contexts but the application of these techniques to the cyber security domain is complex and still immature. Among the many open issues that affect security systems based on machine learning, we concentrate on adversarial attacks that aim to affect the detection and prediction capabilities of machine-learning models. We consider realistic types of poisoning and evasion attacks targeting security solutions devoted to malware, spam and network intrusion detection. We explore the possible damages that an attacker can cause to a cyber detector and present some existing and original defensive techniques in the context of intrusion detection systems. This paper contains several performance evaluations that are based on extensive experiments using large traffic datasets. The results highlight that modern adversarial attacks are highly effective against machine-learning classifiers for cyber detection, and that existing solutions require improvements in several directions. The paper paves the way for more robust machine-learning-based techniques that can be integrated into cyber security platforms.

URLhttps://ieeexplore.ieee.org/document/8756865
DOI10.23919/CYCON.2019.8756865
Citation Keyapruzzese_addressing_2019