Multiple classifier systems for robust classifier design in adversarial environments

  • PDF / 1,327,442 Bytes
  • 15 Pages / 595.276 x 790.866 pts Page_size
  • 47 Downloads / 241 Views

DOWNLOAD

REPORT


ORIGINAL ARTICLE

Multiple classifier systems for robust classifier design in adversarial environments Battista Biggio • Giorgio Fumera • Fabio Roli

Received: 1 August 2010 / Accepted: 23 September 2010 / Published online: 12 October 2010  Springer-Verlag 2010

Abstract Pattern recognition systems are increasingly being used in adversarial environments like network intrusion detection, spam filtering and biometric authentication and verification systems, in which an adversary may adaptively manipulate data to make a classifier ineffective. Current theory and design methods of pattern recognition systems do not take into account the adversarial nature of such kind of applications. Their extension to adversarial settings is thus mandatory, to safeguard the security and reliability of pattern recognition systems in adversarial environments. In this paper we focus on a strategy recently proposed in the literature to improve the robustness of linear classifiers to adversarial data manipulation, and experimentally investigate whether it can be implemented using two well known techniques for the construction of multiple classifier systems, namely, bagging and the random subspace method. Our results provide some hints on the potential usefulness of classifier ensembles in adversarial classification tasks, which is different from the motivations suggested so far in the literature. Keywords Adversarial classification  Multiple classifier systems  Robust classifiers  Linear classifiers

B. Biggio (&)  G. Fumera  F. Roli Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy e-mail: [email protected] G. Fumera e-mail: [email protected] F. Roli e-mail: [email protected]

1 Introduction Pattern recognition systems are increasingly being used in applications like biometric authentication and verification, intrusion detection in computer networks, spam filtering, Web page ranking and network protocol verification [17, 23, 25, 32, 33, 42, 46], usually to discriminate between two pattern classes corresponding to a legitimate and a malicious behaviour. These applications are different from the ones considered in the standard pattern recognition theory, since they are characterised by the presence of a human adversary who generates malicious samples, and can adaptively manipulate data to avoid their detection. For example, the goal of biometric verification systems is to discriminate between genuine and impostor users, to allow or deny access to some protected resource. An impostor may try to be recognised as a genuine user by spoofing his fingerprints. Analogously, intrusion detection systems (IDSs) aim at discriminating between legitimate and intrusive network traffic, and hackers may camouflage their network packets so that they are mislabelled as legitimate. Likewise, spammers adopt several tricks to obfuscate their emails and get them past spam filters. In automatic Web page ranking pattern recognition systems can be used to automatically label or sco

Data Loading...