Security Evaluation of Pattern Classifiers under Attack
Top Cited Papers
- 5 April 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Knowledge and Data Engineering
- Vol. 26 (4), 984-996
- https://doi.org/10.1109/tkde.2013.57
Abstract
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. Extending pattern classification theory and design methods to adversarial settings is thus a novel and very relevant research direction, which has not yet been pursued in a systematic way. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier's behavior in adversarial environments, and lead to better design choices.Keywords
All Related Versions
This publication has 35 references indexed in Scilit:
- Security evaluation of biometric authentication systems under real spoofing attacksIET Biometrics, 2012
- Multiple classifier systems for robust classifier design in adversarial environmentsInternational Journal of Machine Learning and Cybernetics, 2010
- The security of machine learningMachine Learning, 2010
- Learning to classify with missing and corrupted featuresMachine Learning, 2009
- Robustness of multimodal biometric fusion methods against spoof attacksJournal of Visual Languages & Computing, 2009
- What-If AnalysisPublished by Springer Nature ,2009
- Machine learning in automated text categorizationACM Computing Surveys, 2002
- New Support Vector AlgorithmsNeural Computation, 2000
- Support vector machines for spam categorizationIEEE Transactions on Neural Networks, 1999
- Learning in the Presence of Malicious ErrorsSIAM Journal on Computing, 1993