메뉴 건너뛰기




Volumn , Issue , 2011, Pages 43-57

Adversarial machine learning

Author keywords

Adversarial learning; Computer security; Game theory; Intrusion detection; Machine learning; Security metrics; Spam filters; Statistical learning

Indexed keywords

ADVERSARIAL LEARNING; MACHINE-LEARNING; SECURITY METRICS; SPAM FILTER; STATISTICAL LEARNING;

EID: 80955143573     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046684.2046692     Document Type: Conference Paper
Times cited : (1113)

References (65)
  • 7
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC'08, pages 609-618, 2008.
    • (2008) STOC'08 , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 8
    • 84858719086 scopus 로고    scopus 로고
    • Nash equilibria of static prediction games
    • M. Brückner and T. Scheffer. Nash equilibria of static prediction games. In NIPS, pages 171-179. 2009.
    • (2009) NIPS , pp. 171-179
    • Brückner, M.1    Scheffer, T.2
  • 10
    • 84858769465 scopus 로고    scopus 로고
    • Privacy-preserving logistic regression
    • K. Chaudhuri and C. Monteleoni. Privacy-preserving logistic regression. In NIPS, pages 289-296, 2009.
    • (2009) NIPS , pp. 289-296
    • Chaudhuri, K.1    Monteleoni, C.2
  • 11
    • 79955858775 scopus 로고    scopus 로고
    • Differentially private empirical risk minimization
    • K. Chaudhuri, C. Monteleoni, and A. D. Sarwate. Differentially private empirical risk minimization. JMLR, 12:1069-1109, 2011.
    • (2011) JMLR , vol.12 , pp. 1069-1109
    • Chaudhuri, K.1    Monteleoni, C.2    Sarwate, A.D.3
  • 13
    • 38149123929 scopus 로고    scopus 로고
    • Advanced allergy attacks: Does a corpus really help?
    • of LNCS
    • S. P. Chung and A. K. Mok. Advanced allergy attacks: Does a corpus really help? In RAID'07, volume 4637 of LNCS, pages 236-255, 2007.
    • (2007) RAID'07 , vol.4637 , pp. 236-255
    • Chung, S.P.1    Mok, A.K.2
  • 15
    • 34248577801 scopus 로고    scopus 로고
    • Algorithms for Projection-Pursuit robust principal component analysis
    • DOI 10.1016/j.chemolab.2007.01.004, PII S016974390700007X
    • C. Croux, P. Filzmoser, and M. R. Oliveira. Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87(2):218-225, 2007. (Pubitemid 46755420)
    • (2007) Chemometrics and Intelligent Laboratory Systems , vol.87 , Issue.2 , pp. 218-225
    • Croux, C.1    Filzmoser, P.2    Oliveira, M.R.3
  • 17
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS'03, pages 202-210, 2003.
    • (2003) PODS'03 , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 18
    • 84883298285 scopus 로고    scopus 로고
    • P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users
    • Y. Duan, J. Canny, and J. Zhan. P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users. In USENIX Security, pages 207-222, 2010.
    • (2010) USENIX Security , pp. 207-222
    • Duan, Y.1    Canny, J.2    Zhan, J.3
  • 20
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • C. Dwork. A firm foundation for private data analysis. Comms. ACM, 54(1):86-95, 2011.
    • (2011) Comms. ACM , vol.54 , Issue.1 , pp. 86-95
    • Dwork, C.1
  • 21
    • 70350682013 scopus 로고    scopus 로고
    • Differential privacy and robust statistics
    • C. Dwork and J. Lei. Differential privacy and robust statistics. In STOC'09, pages 371-380, 2009.
    • (2009) STOC'09 , pp. 371-380
    • Dwork, C.1    Lei, J.2
  • 24
    • 70350689921 scopus 로고    scopus 로고
    • On the complexity of differentially private data release: Efficient algorithms and hardness results
    • C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC'09, pages 381-390, 2009.
    • (2009) STOC'09 , pp. 381-390
    • Dwork, C.1    Naor, M.2    Reingold, O.3    Rothblum, G.N.4    Vadhan, S.5
  • 25
    • 51849089628 scopus 로고    scopus 로고
    • New efficient attacks on statistical disclosure control mechanisms
    • C. Dwork and S. Yekhanin. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO'08, pages 469-480, 2008.
    • (2008) CRYPTO'08 , pp. 469-480
    • Dwork, C.1    Yekhanin, S.2
  • 26
    • 0002294353 scopus 로고
    • Question 14: Combining independent tests of significance
    • R. A. Fisher. Question 14: Combining independent tests of significance. American Statistician, 2(5):30-31, 1948.
    • (1948) American Statistician , vol.2 , Issue.5 , pp. 30-31
    • Fisher, R.A.1
  • 27
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • P. Fogla and W. Lee. Evading network anomaly detection systems: Formal reasoning and practical techniques. In CCS'06, pages 59-68, 2006. (Pubitemid 47131356)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 59-68
    • Fogla, P.1    Lee, W.2
  • 28
    • 34250717444 scopus 로고    scopus 로고
    • Nightmare at test time: Robust learning by feature deletion
    • A. Globerson and S. Roweis. Nightmare at test time: Robust learning by feature deletion. In ICML'06, pages 353-360, 2006.
    • (2006) ICML'06 , pp. 353-360
    • Globerson, A.1    Roweis, S.2
  • 29
    • 80955145180 scopus 로고    scopus 로고
    • Secure multiparty linear regression based on homomorphic encryption
    • To appear
    • R. Hall, S. Fienberg, and Y. Nardi. Secure multiparty linear regression based on homomorphic encryption. J. Official Statistics, 2011. To appear.
    • (2011) J. Official Statistics
    • Hall, R.1    Fienberg, S.2    Nardi, Y.3
  • 31
    • 77954711905 scopus 로고    scopus 로고
    • On the geometry of differential privacy
    • M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC'10, pages 705-714, 2010.
    • (2010) STOC'10 , pp. 705-714
    • Hardt, M.1    Talwar, K.2
  • 35
    • 80955164793 scopus 로고    scopus 로고
    • Online anomaly detection under adversarial impact
    • M. Kloft and P. Laskov. Online anomaly detection under adversarial impact. In AISTATS'10, 2010.
    • (2010) AISTATS'10
    • Kloft, M.1    Laskov, P.2
  • 36
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM'04, pages 219-230, 2004. (Pubitemid 40954882)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 37
    • 74049158178 scopus 로고    scopus 로고
    • A framework for quantitative security analysis of machine learning
    • P. Laskov and M. Kloft. A framework for quantitative security analysis of machine learning. In AISec'09, pages 1-4, 2009.
    • (2009) AISec'09 , pp. 1-4
    • Laskov, P.1    Kloft, M.2
  • 38
    • 77953908448 scopus 로고    scopus 로고
    • Fighting unicode-obfuscated spam
    • Proceedings of the Anti-Phishing Working Groups 2
    • C. Liu and S. Stamm. Fighting unicode-obfuscated spam. In Proceedings of the Anti-Phishing Working Groups 2 Annual eCrime Researchers Summit, pages 45-59, 2007.
    • (2007) Annual ECrime Researchers Summit , pp. 45-59
    • Liu, C.1    Stamm, S.2
  • 40
    • 65449142381 scopus 로고    scopus 로고
    • Good word attacks on statistical spam filters
    • D. Lowd and C. Meek. Good word attacks on statistical spam filters. In CEAS'05, 2005.
    • (2005) CEAS'05
    • Lowd, D.1    Meek, C.2
  • 43
    • 70350678967 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the net
    • F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD'09, pages 627-636, 2009.
    • (2009) KDD'09 , pp. 627-636
    • Mcsherry, F.1    Mironov, I.2
  • 44
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS'07, pages 94-103, 2007.
    • (2007) FOCS'07 , pp. 94-103
    • Mcsherry, F.1    Talwar, K.2
  • 45
    • 13944276290 scopus 로고    scopus 로고
    • SpamBayes: Effective open-source, Bayesian based, email classification system
    • T. A. Meyer and B. Whateley. SpamBayes: Effective open-source, Bayesian based, email classification system. In CEAS'0Jh 2004.
    • (2004) CEAS'0Jh
    • Meyer, T.A.1    Whateley, B.2
  • 53
    • 84898063255 scopus 로고    scopus 로고
    • Learning convex bodies is hard
    • L. Rademacher and N. Goyal. Learning convex bodies is hard. In COLT, pages 303-308, 2009.
    • (2009) COLT , pp. 303-308
    • Rademacher, L.1    Goyal, N.2
  • 54
    • 36349029177 scopus 로고    scopus 로고
    • Sensitivity of PCA for traffic anomaly detection
    • DOI 10.1145/1269899.1254895, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
    • H. Ringberg, A. Soule, J. Rexford, and C. Diot. Sensitivity of PCA for traffic anomaly detection. In SIGMETRICS, pages 109-120, 2007. (Pubitemid 350158077)
    • (2007) Performance Evaluation Review , vol.35 , Issue.1 , pp. 109-120
    • Ringberg, H.1    Soule, A.2    Rexford, J.3    Diot, C.4
  • 55
    • 1542634595 scopus 로고    scopus 로고
    • A statistical approach to the spam problem
    • Mar.
    • G. Robinson. A statistical approach to the spam problem. Linux Journal, Mar. 2003.
    • (2003) Linux Journal
    • Robinson, G.1
  • 57
    • 84877775237 scopus 로고    scopus 로고
    • ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
    • A. Feldmann and L. Mathy, editors New York, NY, USA, November ACM
    • B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. hon Lau, S. Rao, N. Taft, and J. D. Tygar. ANTIDOTE: Understanding and defending against poisoning of anomaly detectors. In A. Feldmann and L. Mathy, editors, IMC'09, pages 1-14, New York, NY, USA, November 2009. ACM.
    • (2009) IMC'09 , pp. 1-14
    • Rubinstein, B.I.P.1    Nelson, B.2    Huang, L.3    Joseph, A.D.4    Hon Lau, S.5    Rao, S.6    Taft, N.7    Tygar, J.D.8
  • 58
    • 84856463585 scopus 로고    scopus 로고
    • Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers
    • D. Sculley, G. M. Wachman, and C. E. Brodley. Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers. In TREC'06, 2006.
    • (2006) TREC'06
    • Sculley, D.1    Wachman, G.M.2    Brodley, C.E.3
  • 59
    • 79959714549 scopus 로고    scopus 로고
    • Privacy-preserving statistical estimation with optimal convergence rates
    • A. Smith. Privacy-preserving statistical estimation with optimal convergence rates. In STOC2011, pages 813-822, 2011.
    • (2011) STOC2011 , pp. 813-822
    • Smith, A.1
  • 62
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • of LNCS
    • K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In RAID'02, volume 2516 of LNCS, pages 54-73, 2002.
    • (2002) RAID'02 , vol.2516 , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 63
    • 85180803572 scopus 로고    scopus 로고
    • Limits of learning-based signature generation with adversaries
    • S. Venkataraman, A. Blum, and D. Song. Limits of learning-based signature generation with adversaries. In NDSS'08, 2008.
    • (2008) NDSS'08
    • Venkataraman, S.1    Blum, A.2    Song, D.3
  • 64
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In CCS'02, pages 255-264, 2002.
    • (2002) CCS'02 , pp. 255-264
    • Wagner, D.1    Soto, P.2
  • 65
    • 33947663308 scopus 로고    scopus 로고
    • On attacking statistical spam filters
    • G. L. Wittel and S. F. Wu. On attacking statistical spam filters. In CEAS'Oi, 2004.
    • (2004) CEAS'Oi
    • Wittel, G.L.1    Wu, S.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.