SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Pattern Recognition
and Applications Lab

Is Data Clustering in Adversarial Settings Secure?
Ba#sta	
  Biggio	
  (1),	
  Ignazio	
  Pillai	
  (1),	
  Samuel	
  Rota	
  Bulò	
  (2),	
  Davide	
  Ariu	
  (1),	
  
Marcello	
  Pelillo	
  (3),	
  and	
  Fabio	
  Roli	
  (1)	
  
	
  
(1)	
  Università	
  di	
  Cagliari	
  (IT);	
  (2)	
  FBK-­‐irst	
  (IT);	
  (3)	
  Università	
  Ca’	
  Foscari	
  di	
  Venezia	
  (IT)	
  

	
  

	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  

Berlin,	
  4	
  November	
  2013	
  

University
of Cagliari, Italy
	
  

Department of
Electrical and Electronic
Engineering
 

Motivation: is clustering secure?
• 

Data clustering increasingly applied in security-sensitive tasks
–  e.g., malware clustering for anti-virus / IDS signature generation

• 

Carefully targeted attacks may mislead the clustering process

x	
   x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  
x	
   x	
   x	
  

x	
   x	
  
x	
   x	
  

x	
  

x	
   x	
  
x	
   x	
   x	
   x	
   x	
   x	
  
x	
   x	
   x	
   x	
   x	
   x	
  
x	
  
x	
   x	
  
x	
  
x	
   x	
   x	
  
x	
  
Samples can be added to merge
(and split) existing clusters

http://pralab.diee.unica.it

x	
   x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  
x	
   x	
  
x	
   x	
   x	
  

x	
   x	
  
x	
   x	
  
x	
   x	
  
x	
  

Samples can be obfuscated
and hidden within existing
clusters (e.g., fringe clusters)

(1) D. B. Skillicorn. Adversarial knowledge discovery. IEEE Intelligent Systems, 24:54–61, 2009.
(2) J. G. Dutrisac and D. Skillicorn. Hiding clusters in adversarial settings. In IEEE Int’l Conf.
2	
  
Intelligence and Security Informatics, pp.185–187, 2008.
 

Our work
• 

Framework for security evaluation of clustering algorithms
1.  Definition of potential attacks
2.  Empirical evaluation of their impact

• 

Adversary’s model
– 
– 
– 
– 

• 

Goal
Knowledge
Capability
Attack strategy

Inspired from previous work on adversarial learning
–  Barreno et al., Can machine learning be secure?, ASIACCS 2006
–  Huang et al., Adversarial machine learning, AISec 2011
–  Biggio et al., Security evaluation of pattern classifiers under attack, IEEE Trans.
Knowledge and Data Eng., 2013

http://pralab.diee.unica.it

3	
  
 

Adversary’s goal
• 

Security violation
–  Integrity: hiding clusters / malicious activities without compromising
normal system operation
•  e.g., creating fringe clusters

–  Availability: compromising normal system operation by altering the
clustering output
•  e.g., merging existing clusters

–  Privacy: gaining confidential information about system users by
reverse-engineering the clustering process

• 

Attack specificity
–  Targeted: affects clustering of a given subset of samples
–  Indiscriminate: affects clustering of any sample

http://pralab.diee.unica.it

4	
  
 

Adversary’s knowledge
• 

The adversary may know:

INPUT DATA

• 

FEATURE
REPRESENTATION

CLUSTERING
ALGORITHM

ALGORITHM
PARAMETERS
e.g., initialization

Perfect knowledge
–  upper bound on the performance degradation under attack

http://pralab.diee.unica.it

5	
  
 

Adversary’s capability
• 

Attacker’s capability is bounded:
–  maximum number of samples that can be added to the input data
•  e.g., the attacker may only control a small fraction of malware samples
collected by a honeypot

–  maximum amount of modifications (distance in feature space)
•  e.g., malware samples should preserve their malicious functionality

x2	
  
Feasible domain
(e.g., L1-norm)

x'

http://pralab.diee.unica.it

x

x1	
  

x − x " ≤ d max
1

6	
  
 

Formalizing the optimal attack strategy
Attacker’s goal
Knowledge of the data, features, …

max Eθ ~µ "g ( A!;θ )$
#
%
A!

s.t. A! ∈ Ω(A)
Capability of manipulating the input data

Perfect knowledge:

http://pralab.diee.unica.it

Eθ ~µ "g ( A!;θ )$ = g ( A!;θ 0 )
#
%

7	
  
 

Poisoning attacks (availability violation)
• 
• 

Goal: maximally compromising the clustering output on D
Capability: adding m attack samples

max g ( A!;θ 0 ) = dc (C, fD (D ∪ A!))
A!

m
s.t. A! ∈ Ω p = {{ai!}i=1 ⊂ R d }

x	
  
x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  
C = f (D)
http://pralab.diee.unica.it

x	
   x	
   x	
  

Heuristics tailored to the clustering
algorithm for efficient solution!

A’	
  

x	
   x	
  
x	
   x	
  

x	
  

x	
  
x	
  
x	
   x	
   x	
   x	
   x	
   x	
  
x	
   x	
   x	
   x	
   x	
   x	
  
x	
  
x	
   x	
  
f (D ∪ A") x	
  
x	
   x	
   x	
  
x	
  
8	
  
 

Single-linkage hierarchical clustering
• 

Bottom-up agglomerative clustering
–  each point is initially considered as a cluster
–  closest clusters are iteratively merged
–  single-linkage criterion dist(Ci , C j ) = min

a∈Ci , b∈C j

x	
  
x	
  
x	
   x	
   x	
  
x	
   x	
  
x	
   x	
   x	
  
x	
   x	
  
x	
  
C = f (D)
x	
   x	
  

d(a, b)

0.8
0.7
0.6
0.5

Dendrogram cut

0.4
0.3
0.2

x	
   x	
  

0.1
0
3

http://pralab.diee.unica.it

7

2

4

5

9

1

6

8

14 15 16 17 10 11 12 13

9	
  
 

Poisoning attacks vs. single-linkage HC
max g ( A!;θ 0 ) = dc (C, fD (D ∪ A!))
A!

s.t. A! ∈ Ω p
#
%
For a given cut criterion:
…
%
T
T
dc (Y, Y !) = YY − Y !Y ! ,
Y =%
F
%
%
Sample 5
%
$
Sample 1

1
0
0
1
0

0
0
0
0
1

0
1
1
0
0

&
# 1 0
(
%
(
% 0 1
(, YY T = % 0 1
(
% 1 0
(
%
(
% 0 0
'
$

0
1
1
0
0

1
0
0
1
0

0
0
0
0
1

&
(
(
(
(
(
(
'

We assume the most advantageous criterion for the clustering algorithm:
the dendrogram cut is chosen to minimize the attacker’s objective!

http://pralab.diee.unica.it

10	
  
 

Poisoning attacks vs. single-linkage HC
• 

Heuristic-based solutions
–  Greedy approach: adding one attack sample at each iteration

2.5
2
1.5
1
0.5
0
−0.5
−1
−1.5
−2
−2.5
−2 −1.5 −1 −0.5

Local maxima are often found in
between clusters

16
14

Close to connections (bridges)
that have been cut to obtain the
final k clusters

12
10
8

Can be obtained directly from
the dendrogram!

6
4
0.9

2

0.8

k-1 Bridges
0.7

0

0.5

1

1.5

0.6
0.5
0.4
Dendrogram cut
0.3
0.2

http://pralab.diee.unica.it

0.1

11	
  

0
3

7

9

4

2

5

1

8

6 14 16 17 15 18 21 19 20 10 12 11 13
 

Poisoning attacks vs. single-linkage HC
• 

Heuristic-based solutions
1. Bridge (Best): evaluates the objective function k-1 times, each time by
adding an attack point in between a bridge

2.5
2
1.5
1
0.5
0
−0.5
−1
−1.5
−2
−2.5
−2 −1.5 −1 −0.5

http://pralab.diee.unica.it

16

Requires running the clustering
algorithm k-1 times!

14
12
10
8
6
4
2
0

0.5

1

2. Bridge (Hard): estimates the
objective function assuming that
each attack point will merge the
corresponding clusters
Does not require running the
clustering algorithm

1.5

12	
  
 

Poisoning attacks vs. single-linkage HC
• 

Heuristic-based solutions
3. Bridge (Soft): similar to Bridge (Hard), but using soft clustering
assignments for Y (estimated with Gaussian KDE)

2.5
2
1.5
1
0.5
0
−0.5
−1
−1.5
−2
−2.5
−2 −1.5 −1 −0.5

http://pralab.diee.unica.it

0

0.5

1

1.5

4.52.5
4
2
3.51.5
1
3
0.5
2.5
0
2 −0.5
1.5 −1
1 −1.5
−2
0.5
−2.5
−2

−1.5

−1

−0.5

0

0.5

1

1.5

Clustering	
  output	
  aVer	
  greedily	
  adding	
  
20	
  aXack	
  points	
  
13	
  
 

Experiments on poisoning attacks
• 

Banana: artificial data, 80 samples, 2 features, k=4 initial clusters

• 

Malware: real data(1), 1,000 samples, 6 features, k≈9 initial clusters
(estimated from data minimizing the Davies-Bouldin Index)
–  Features:
1. 
2. 
3. 
4. 
5. 
6. 

• 

number of GET requests
number of POST requests
average URL length
average number of URL parameters
average amount of data sent by POST requests
average response length

MNIST Handwritten Digits: real data, 330 samples per cluster, 28 x
28 = 784 features (pixels), k=3 initial clusters corresponding to
digits ‘0’, ‘1’, and ‘6’

http://pralab.diee.unica.it

(1) R. Perdisci, D. Ariu, and G. Giacinto. Scalable fine-grained behavioral
clustering of http-based malware. Computer Networks, 57(2):487-500, 2013.

14	
  
 

Experiments on poisoning attacks
• 

Attack strategies: Bridge (Best), Bridge (Hard), Bridge (Soft),
Random, Random (Best)
–  Random (Best) selects the best random attack over k-1 attempts
–  Same complexity as Bridge (Best)

Banana

Malware
Digits
180
800
160
700
50
140
600
Random
120
40
500
Random (Best)
100
400
30
Bridge (Best)
80
300
Bridge (Soft)
60
20
200
Bridge (Hard)
40
10
100
20
0
0
0
0% 2% 5% 7% 9% 12% 15% 18% 20% 0%
1%
2%
3%
4%
5%
0.0% 0.2% 0.4% 0.6% 0.8% 1.0%
6
30
100
4
25
80
14
20
60
12
15
40
10
10
20
8
5
0
0% 2% 5% 7% 9% 12% 15% 18% 20% 0%
1%
2%
3%
4%
5% 0.0% 0.2% 0.4% 0.6% 0.8% 1.0%
Fraction of samples controlled by the attacker Fraction of samples controlled by the attacker Fraction of samples controlled by the attacker

http://pralab.diee.unica.it

Objective Function

Objective Function

Num Clusters (k)

Num Clusters (k)

Num Clusters (k)

Objective Function

60

15	
  
 

Experiments on poisoning attacks
• 

Some attack samples obtained by the given attack strategies on
the MNIST Handwritten Digits, at iterations 1, 2, and 10.
Random

Random
(Best)

Bridge
(Best)

Bridge
(Soft)

Bridge
(Hard)

1

2

10

http://pralab.diee.unica.it

16	
  
 

Obfuscation attacks (integrity violation)
• 
• 

Goal: hiding attacks A without compromising clustering of D
Capability: bounded manipulation of attack samples

max g ( A!;θ 0 ) = −dc (C t , f (D ∪ A!)), where π D (C t ) = f (D)
A!

{

s.t. A! ∈ Ωo (A) = {ai!}|A| : ds (A, A!) = max ai − ai! 2 ≤ dmax
i=1

x	
   x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  
D

x	
   x	
  
x	
   x	
  

i

x	
   x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  
x	
   x	
  
A!
A

http://pralab.diee.unica.it

x	
   x	
   x	
  

}

x	
   x	
  
x	
   x	
  
x	
   x	
  
x	
  
17	
  
 

Obfuscation attacks vs. single-linkage HC
• 

Heuristic-based solution
–  For each attack sample a in A
–  Select the closest sample d in D from the cluster to which a should
belong to, and define a’ as

( d − a) ,
a! = a + α
d−a

2

α = min ( dmax , d − a

2

)

x	
   x	
  
x	
   x	
   x	
  
x	
   x	
   x	
  
x	
  d
a! x	
  

x	
   x	
  
x	
   x	
  
x	
   x	
  

x	
  
a x	
   x	
   x	
  

http://pralab.diee.unica.it

18	
  
 

Experiments on obfuscation attacks
MNIST Handwritten Digits

Objective Function

– 
– 
– 
– 

Initial clusters ‘0’, ‘1’, ‘6’, ‘3’
Attacker modifies ‘3’s to have them clustered with ‘6’
Attacker minimizes distance from the desired clustering
Clustering minimizes distance from the initial clusters (where ‘3’s are
not manipulated)

350
300
250
200
150

Clustering
Attacker

100
50
0
0

1

2

3

4

0.0
http://pralab.diee.unica.it

5

6

7

8

2.0

Num Clusters (k)

• 

5
4.6
4.2
3.8
3.4
3
0

1

2

9 10

3.0

4.0

3

4

5 6
d max

5.0

7

8

9 10

7.0
19	
  
 

350
300
250
200
150

Clustering
Attacker

100
50
0
0

1

2

3

4

5

6

7

8

Num Clusters (k)

Objective Function

Experiments on obfuscation attacks
5
4.6
4.2
3.8
3.4
3
0

1

2

3

9 10

4

5 6
d max

7

8

9 10

Why the attacker’s objective increases here?

x	
  
x	
   x	
   x	
  
x	
   x	
  

x	
   x	
  
x
x	
   x	
  
x	
  
x	
   x	
  

3	
  

6	
  

x	
  
x	
   x x x	
   x	
  
x	
  x	
   x	
  
x	
   x	
   x	
  
x	
  
x	
  

x	
   x	
  
x	
   x	
   x	
  x x
x	
   x	
  
x	
  
x	
  
x	
  
x	
   x	
  

Bridging!

This may suggest a more effective heuristic, based on modifying only a subset of attacks!
http://pralab.diee.unica.it

20	
  
 

Conclusions and future work
• 
• 
• 

Framework for security evaluation of clustering algorithms
Definition of poisoning and obfuscation attacks
Case study on single-linkage HC highlights vulnerability to attacks

• 

Future work
–  Extensions to other algorithms, common solver for the attack strategy
•  e.g., black-box optimization with suitable heuristics

–  Connections with clustering stability
–  Secure / Robust clustering algorithms

http://pralab.diee.unica.it

21	
  
 

	
  
Thanks	
  for	
  your	
  aXenon!	
  

?	
  
	
  

Any	
  ques*ons

http://pralab.diee.unica.it

22	
  

Más contenido relacionado

La actualidad más candente

Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaRupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
Causative Adversarial Learning
Causative Adversarial LearningCausative Adversarial Learning
Causative Adversarial LearningDavid Dao
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...GeekPwn Keen
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...Malachi Jones
 
Subverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitSubverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitRam Shankar Siva Kumar
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber securityKim Hammar
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Ram Shankar Siva Kumar
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningKuppusamy P
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsRam Shankar Siva Kumar
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
 

La actualidad más candente (20)

Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Adversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam BhattacharyaAdversarial Learning_Rupam Bhattacharya
Adversarial Learning_Rupam Bhattacharya
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
Causative Adversarial Learning
Causative Adversarial LearningCausative Adversarial Learning
Causative Adversarial Learning
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Adversarial ML - Part 2.pdf
Adversarial ML - Part 2.pdfAdversarial ML - Part 2.pdf
Adversarial ML - Part 2.pdf
 
Adversarial ML - Part 1.pdf
Adversarial ML - Part 1.pdfAdversarial ML - Part 1.pdf
Adversarial ML - Part 1.pdf
 
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
 
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...Automated In-memory Malware/Rootkit  Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
 
Subverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profitSubverting Machine Learning Detections for fun and profit
Subverting Machine Learning Detections for fun and profit
 
Self-learning systems for cyber security
Self-learning systems for cyber securitySelf-learning systems for cyber security
Self-learning systems for cyber security
 
Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense Infiltrate 2015 - Data Driven Offense
Infiltrate 2015 - Data Driven Offense
 
Anomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine LearningAnomaly detection (Unsupervised Learning) in Machine Learning
Anomaly detection (Unsupervised Learning) in Machine Learning
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using Graphs
 
2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...
2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...
2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...
 
Robustness in deep learning
Robustness in deep learningRobustness in deep learning
Robustness in deep learning
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 

Destacado

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Pluribus One
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionKaty Lee
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingContent Marketing Institute
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Destacado (10)

Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Making neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursionMaking neural programming architectures generalize via recursion
Making neural programming architectures generalize via recursion
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar a Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Secure?

Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Kim Hammar
 
Two methods for optimising cognitive model parameters
Two methods for optimising cognitive model parametersTwo methods for optimising cognitive model parameters
Two methods for optimising cognitive model parametersUniversity of Huddersfield
 
CMU Trecvid sed11
CMU Trecvid sed11CMU Trecvid sed11
CMU Trecvid sed11Lu Jiang
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionKim Hammar
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Kim Hammar
 
Machine learning for_finance
Machine learning for_financeMachine learning for_finance
Machine learning for_financeStefan Duprey
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune SystemsLeandro de Castro
 
Introduction of Feature Hashing
Introduction of Feature HashingIntroduction of Feature Hashing
Introduction of Feature HashingWush Wu
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and ExploitationMattia Salvi
 
Object Detection using Deep Neural Networks
Object Detection using Deep Neural NetworksObject Detection using Deep Neural Networks
Object Detection using Deep Neural NetworksUsman Qayyum
 
Complex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsComplex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsPeter Solymos
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionLionel Briand
 
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlIntrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlKim Hammar
 
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Kolja Kleineberg
 
Feature Engineering
Feature EngineeringFeature Engineering
Feature EngineeringSri Ambati
 

Similar a Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Secure? (20)

Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
Learning Near-Optimal Intrusion Response for Large-Scale IT Infrastructures v...
 
Two methods for optimising cognitive model parameters
Two methods for optimising cognitive model parametersTwo methods for optimising cognitive model parameters
Two methods for optimising cognitive model parameters
 
CMU Trecvid sed11
CMU Trecvid sed11CMU Trecvid sed11
CMU Trecvid sed11
 
Report
ReportReport
Report
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Learning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via DecompositionLearning Optimal Intrusion Responses via Decomposition
Learning Optimal Intrusion Responses via Decomposition
 
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
Learning Near-Optimal Intrusion Responses for IT Infrastructures via Decompos...
 
Machine learning for_finance
Machine learning for_financeMachine learning for_finance
Machine learning for_finance
 
ICSRS_R038.pptx
ICSRS_R038.pptxICSRS_R038.pptx
ICSRS_R038.pptx
 
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems
 
Introduction of Feature Hashing
Introduction of Feature HashingIntroduction of Feature Hashing
Introduction of Feature Hashing
 
Virtual Machines Security Internals: Detection and Exploitation
 Virtual Machines Security Internals: Detection and Exploitation Virtual Machines Security Internals: Detection and Exploitation
Virtual Machines Security Internals: Detection and Exploitation
 
Object Detection using Deep Neural Networks
Object Detection using Deep Neural NetworksObject Detection using Deep Neural Networks
Object Detection using Deep Neural Networks
 
Binary Analysis - Luxembourg
Binary Analysis - LuxembourgBinary Analysis - Luxembourg
Binary Analysis - Luxembourg
 
Complex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutionsComplex models in ecology: challenges and solutions
Complex models in ecology: challenges and solutions
 
Search-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability DetectionSearch-driven String Constraint Solving for Vulnerability Detection
Search-driven String Constraint Solving for Vulnerability Detection
 
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback ControlIntrusion Tolerance for Networked Systems through Two-level Feedback Control
Intrusion Tolerance for Networked Systems through Two-level Feedback Control
 
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...Geometric correlations mitigate the extreme vulnerability of multiplex networ...
Geometric correlations mitigate the extreme vulnerability of multiplex networ...
 
Feature Engineering
Feature EngineeringFeature Engineering
Feature Engineering
 

Más de Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsPluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 PosterPluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterPluribus One
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisPluribus One
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Pluribus One
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Pluribus One
 

Más de Pluribus One (14)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 
Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011Ariu - Workshop on Multiple Classifier Systems - 2011
Ariu - Workshop on Multiple Classifier Systems - 2011
 
Ariu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern AnalysisAriu - Workshop on Applications of Pattern Analysis
Ariu - Workshop on Applications of Pattern Analysis
 
Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011Ariu - Workshop on Multiple Classifier Systems 2011
Ariu - Workshop on Multiple Classifier Systems 2011
 
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...
 
Wiamis2010 poster
Wiamis2010 posterWiamis2010 poster
Wiamis2010 poster
 

Último

CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxMadhavi Dharankar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 

Último (20)

CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 

Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Secure?

  • 1. Pattern Recognition and Applications Lab Is Data Clustering in Adversarial Settings Secure? Ba#sta  Biggio  (1),  Ignazio  Pillai  (1),  Samuel  Rota  Bulò  (2),  Davide  Ariu  (1),   Marcello  Pelillo  (3),  and  Fabio  Roli  (1)     (1)  Università  di  Cagliari  (IT);  (2)  FBK-­‐irst  (IT);  (3)  Università  Ca’  Foscari  di  Venezia  (IT)                                     Berlin,  4  November  2013   University of Cagliari, Italy   Department of Electrical and Electronic Engineering
  • 2.   Motivation: is clustering secure? •  Data clustering increasingly applied in security-sensitive tasks –  e.g., malware clustering for anti-virus / IDS signature generation •  Carefully targeted attacks may mislead the clustering process x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   Samples can be added to merge (and split) existing clusters http://pralab.diee.unica.it x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   Samples can be obfuscated and hidden within existing clusters (e.g., fringe clusters) (1) D. B. Skillicorn. Adversarial knowledge discovery. IEEE Intelligent Systems, 24:54–61, 2009. (2) J. G. Dutrisac and D. Skillicorn. Hiding clusters in adversarial settings. In IEEE Int’l Conf. 2   Intelligence and Security Informatics, pp.185–187, 2008.
  • 3.   Our work •  Framework for security evaluation of clustering algorithms 1.  Definition of potential attacks 2.  Empirical evaluation of their impact •  Adversary’s model –  –  –  –  •  Goal Knowledge Capability Attack strategy Inspired from previous work on adversarial learning –  Barreno et al., Can machine learning be secure?, ASIACCS 2006 –  Huang et al., Adversarial machine learning, AISec 2011 –  Biggio et al., Security evaluation of pattern classifiers under attack, IEEE Trans. Knowledge and Data Eng., 2013 http://pralab.diee.unica.it 3  
  • 4.   Adversary’s goal •  Security violation –  Integrity: hiding clusters / malicious activities without compromising normal system operation •  e.g., creating fringe clusters –  Availability: compromising normal system operation by altering the clustering output •  e.g., merging existing clusters –  Privacy: gaining confidential information about system users by reverse-engineering the clustering process •  Attack specificity –  Targeted: affects clustering of a given subset of samples –  Indiscriminate: affects clustering of any sample http://pralab.diee.unica.it 4  
  • 5.   Adversary’s knowledge •  The adversary may know: INPUT DATA •  FEATURE REPRESENTATION CLUSTERING ALGORITHM ALGORITHM PARAMETERS e.g., initialization Perfect knowledge –  upper bound on the performance degradation under attack http://pralab.diee.unica.it 5  
  • 6.   Adversary’s capability •  Attacker’s capability is bounded: –  maximum number of samples that can be added to the input data •  e.g., the attacker may only control a small fraction of malware samples collected by a honeypot –  maximum amount of modifications (distance in feature space) •  e.g., malware samples should preserve their malicious functionality x2   Feasible domain (e.g., L1-norm) x' http://pralab.diee.unica.it x x1   x − x " ≤ d max 1 6  
  • 7.   Formalizing the optimal attack strategy Attacker’s goal Knowledge of the data, features, … max Eθ ~µ "g ( A!;θ )$ # % A! s.t. A! ∈ Ω(A) Capability of manipulating the input data Perfect knowledge: http://pralab.diee.unica.it Eθ ~µ "g ( A!;θ )$ = g ( A!;θ 0 ) # % 7  
  • 8.   Poisoning attacks (availability violation) •  •  Goal: maximally compromising the clustering output on D Capability: adding m attack samples max g ( A!;θ 0 ) = dc (C, fD (D ∪ A!)) A! m s.t. A! ∈ Ω p = {{ai!}i=1 ⊂ R d } x   x   x   x   x   x   x   x   x   C = f (D) http://pralab.diee.unica.it x   x   x   Heuristics tailored to the clustering algorithm for efficient solution! A’   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   x   f (D ∪ A") x   x   x   x   x   8  
  • 9.   Single-linkage hierarchical clustering •  Bottom-up agglomerative clustering –  each point is initially considered as a cluster –  closest clusters are iteratively merged –  single-linkage criterion dist(Ci , C j ) = min a∈Ci , b∈C j x   x   x   x   x   x   x   x   x   x   x   x   x   C = f (D) x   x   d(a, b) 0.8 0.7 0.6 0.5 Dendrogram cut 0.4 0.3 0.2 x   x   0.1 0 3 http://pralab.diee.unica.it 7 2 4 5 9 1 6 8 14 15 16 17 10 11 12 13 9  
  • 10.   Poisoning attacks vs. single-linkage HC max g ( A!;θ 0 ) = dc (C, fD (D ∪ A!)) A! s.t. A! ∈ Ω p # % For a given cut criterion: … % T T dc (Y, Y !) = YY − Y !Y ! , Y =% F % % Sample 5 % $ Sample 1 1 0 0 1 0 0 0 0 0 1 0 1 1 0 0 & # 1 0 ( % ( % 0 1 (, YY T = % 0 1 ( % 1 0 ( % ( % 0 0 ' $ 0 1 1 0 0 1 0 0 1 0 0 0 0 0 1 & ( ( ( ( ( ( ' We assume the most advantageous criterion for the clustering algorithm: the dendrogram cut is chosen to minimize the attacker’s objective! http://pralab.diee.unica.it 10  
  • 11.   Poisoning attacks vs. single-linkage HC •  Heuristic-based solutions –  Greedy approach: adding one attack sample at each iteration 2.5 2 1.5 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 −2 −1.5 −1 −0.5 Local maxima are often found in between clusters 16 14 Close to connections (bridges) that have been cut to obtain the final k clusters 12 10 8 Can be obtained directly from the dendrogram! 6 4 0.9 2 0.8 k-1 Bridges 0.7 0 0.5 1 1.5 0.6 0.5 0.4 Dendrogram cut 0.3 0.2 http://pralab.diee.unica.it 0.1 11   0 3 7 9 4 2 5 1 8 6 14 16 17 15 18 21 19 20 10 12 11 13
  • 12.   Poisoning attacks vs. single-linkage HC •  Heuristic-based solutions 1. Bridge (Best): evaluates the objective function k-1 times, each time by adding an attack point in between a bridge 2.5 2 1.5 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 −2 −1.5 −1 −0.5 http://pralab.diee.unica.it 16 Requires running the clustering algorithm k-1 times! 14 12 10 8 6 4 2 0 0.5 1 2. Bridge (Hard): estimates the objective function assuming that each attack point will merge the corresponding clusters Does not require running the clustering algorithm 1.5 12  
  • 13.   Poisoning attacks vs. single-linkage HC •  Heuristic-based solutions 3. Bridge (Soft): similar to Bridge (Hard), but using soft clustering assignments for Y (estimated with Gaussian KDE) 2.5 2 1.5 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 −2 −1.5 −1 −0.5 http://pralab.diee.unica.it 0 0.5 1 1.5 4.52.5 4 2 3.51.5 1 3 0.5 2.5 0 2 −0.5 1.5 −1 1 −1.5 −2 0.5 −2.5 −2 −1.5 −1 −0.5 0 0.5 1 1.5 Clustering  output  aVer  greedily  adding   20  aXack  points   13  
  • 14.   Experiments on poisoning attacks •  Banana: artificial data, 80 samples, 2 features, k=4 initial clusters •  Malware: real data(1), 1,000 samples, 6 features, k≈9 initial clusters (estimated from data minimizing the Davies-Bouldin Index) –  Features: 1.  2.  3.  4.  5.  6.  •  number of GET requests number of POST requests average URL length average number of URL parameters average amount of data sent by POST requests average response length MNIST Handwritten Digits: real data, 330 samples per cluster, 28 x 28 = 784 features (pixels), k=3 initial clusters corresponding to digits ‘0’, ‘1’, and ‘6’ http://pralab.diee.unica.it (1) R. Perdisci, D. Ariu, and G. Giacinto. Scalable fine-grained behavioral clustering of http-based malware. Computer Networks, 57(2):487-500, 2013. 14  
  • 15.   Experiments on poisoning attacks •  Attack strategies: Bridge (Best), Bridge (Hard), Bridge (Soft), Random, Random (Best) –  Random (Best) selects the best random attack over k-1 attempts –  Same complexity as Bridge (Best) Banana Malware Digits 180 800 160 700 50 140 600 Random 120 40 500 Random (Best) 100 400 30 Bridge (Best) 80 300 Bridge (Soft) 60 20 200 Bridge (Hard) 40 10 100 20 0 0 0 0% 2% 5% 7% 9% 12% 15% 18% 20% 0% 1% 2% 3% 4% 5% 0.0% 0.2% 0.4% 0.6% 0.8% 1.0% 6 30 100 4 25 80 14 20 60 12 15 40 10 10 20 8 5 0 0% 2% 5% 7% 9% 12% 15% 18% 20% 0% 1% 2% 3% 4% 5% 0.0% 0.2% 0.4% 0.6% 0.8% 1.0% Fraction of samples controlled by the attacker Fraction of samples controlled by the attacker Fraction of samples controlled by the attacker http://pralab.diee.unica.it Objective Function Objective Function Num Clusters (k) Num Clusters (k) Num Clusters (k) Objective Function 60 15  
  • 16.   Experiments on poisoning attacks •  Some attack samples obtained by the given attack strategies on the MNIST Handwritten Digits, at iterations 1, 2, and 10. Random Random (Best) Bridge (Best) Bridge (Soft) Bridge (Hard) 1 2 10 http://pralab.diee.unica.it 16  
  • 17.   Obfuscation attacks (integrity violation) •  •  Goal: hiding attacks A without compromising clustering of D Capability: bounded manipulation of attack samples max g ( A!;θ 0 ) = −dc (C t , f (D ∪ A!)), where π D (C t ) = f (D) A! { s.t. A! ∈ Ωo (A) = {ai!}|A| : ds (A, A!) = max ai − ai! 2 ≤ dmax i=1 x   x   x   x   x   x   x   x   x   D x   x   x   x   i x   x   x   x   x   x   x   x   x   x   x   A! A http://pralab.diee.unica.it x   x   x   } x   x   x   x   x   x   x   17  
  • 18.   Obfuscation attacks vs. single-linkage HC •  Heuristic-based solution –  For each attack sample a in A –  Select the closest sample d in D from the cluster to which a should belong to, and define a’ as ( d − a) , a! = a + α d−a 2 α = min ( dmax , d − a 2 ) x   x   x   x   x   x   x   x   x  d a! x   x   x   x   x   x   x   x   a x   x   x   http://pralab.diee.unica.it 18  
  • 19.   Experiments on obfuscation attacks MNIST Handwritten Digits Objective Function –  –  –  –  Initial clusters ‘0’, ‘1’, ‘6’, ‘3’ Attacker modifies ‘3’s to have them clustered with ‘6’ Attacker minimizes distance from the desired clustering Clustering minimizes distance from the initial clusters (where ‘3’s are not manipulated) 350 300 250 200 150 Clustering Attacker 100 50 0 0 1 2 3 4 0.0 http://pralab.diee.unica.it 5 6 7 8 2.0 Num Clusters (k) •  5 4.6 4.2 3.8 3.4 3 0 1 2 9 10 3.0 4.0 3 4 5 6 d max 5.0 7 8 9 10 7.0 19  
  • 20.   350 300 250 200 150 Clustering Attacker 100 50 0 0 1 2 3 4 5 6 7 8 Num Clusters (k) Objective Function Experiments on obfuscation attacks 5 4.6 4.2 3.8 3.4 3 0 1 2 3 9 10 4 5 6 d max 7 8 9 10 Why the attacker’s objective increases here? x   x   x   x   x   x   x   x   x x   x   x   x   x   3   6   x   x   x x x   x   x  x   x   x   x   x   x   x   x   x   x   x   x  x x x   x   x   x   x   x   x   Bridging! This may suggest a more effective heuristic, based on modifying only a subset of attacks! http://pralab.diee.unica.it 20  
  • 21.   Conclusions and future work •  •  •  Framework for security evaluation of clustering algorithms Definition of poisoning and obfuscation attacks Case study on single-linkage HC highlights vulnerability to attacks •  Future work –  Extensions to other algorithms, common solver for the attack strategy •  e.g., black-box optimization with suitable heuristics –  Connections with clustering stability –  Secure / Robust clustering algorithms http://pralab.diee.unica.it 21  
  • 22.     Thanks  for  your  aXenon!   ?     Any  ques*ons http://pralab.diee.unica.it 22