用户名: 密码: 验证码:
Poisoning Complete-Linkage Hierarchical Clustering
详细信息    查看全文
  • 作者:Battista Biggio (20)
    Samuel Rota Bulò (21)
    Ignazio Pillai (20)
    Michele Mura (20)
    Eyasu Zemene Mequanint (20)
    Marcello Pelillo (22)
    Fabio Roli (20)
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2014
  • 出版时间:2014
  • 年:2014
  • 卷:8621
  • 期:1
  • 页码:42-52
  • 全文大小:320 KB
  • 参考文献:1. Perdisci, R., Corona, I., Giacinto, G.: Early detection of malicious flux networks via large-scale passive DNS traffic analysis. IEEE Trans. Dependable and Secure Comp.?9(5), 714-26 (2012)
    2. Pouget, F., Dacier, M., Zimmerman, J., Clark, A., Mohay, G.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. of Information Assurance and Security 1(1) (2006)
    3. Perdisci, R., Ariu, D., Giacinto, G.: Scalable fine-grained behavioral clustering of http-based malware. Computer Networks?57(2), 487-00 (2013) CrossRef
    4. Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur.?19(4), 639-68 (2011)
    5. Hanna, S., Huang, L., Wu, E., Li, S., Chen, C., Song, D.: Juxtapp: A scalable system for detecting code reuse among Android applications. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.?7591, pp. 62-1. Springer, Heidelberg (2013) CrossRef
    6. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: SPSM 2011, pp. 15-6 (2011)
    7. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Professional (2002)
    8. Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowledge and Data Eng.?26(4), 984-96 (2014) CrossRef
    9. Brückner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res.?13, 2617-654 (2012)
    10. Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: ACM Workshop AISec 2011, pp. 43-7 (2011)
    11. Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006, pp. 16-5 (2006)
    12. Gro?hans, M., Sawade, C., Brückner, M., Scheffer, T.: Bayesian games for adversarial regression problems. In: ICML, vol.?28 (2013)
    13. Dutrisac, J.G., Skillicorn, D.: Hiding clusters in adversarial settings. In: ISI 2008, pp. 185-87 (2008)
    14. Skillicorn, D.B.: Adversarial knowledge discovery. IEEE Intelligent Systems?24, 54-1 (2009) CrossRef
    15. Biggio, B., Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., Roli, F.: Is data clustering in adversarial settings secure? In: ACM Workshop AISec 2013, pp. 87-8 (2013)
    16. Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: ICML (2012)
    17. Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: CEAS (2009)
    18. Jain, A.K., Dubes, R.C.: Algorithms for clustering data. Prentice-Hall, Inc., Upper Saddle River (1988)
    19. Meilǎ, M.: Comparing clusterings: An axiomatic view. In: ICML, pp. 577-84 (2005)
    20. Halkidi, M., Batistakis, Y., Vazirgiannis, M.: On clustering validation techniques. Journal of Intelligent Information Systems?17(2-3), 107-45 (2001) CrossRef
    21. LeCun, Y., Jackel, L., Bottou, L., Brunot, A., Cortes, C., Denker, J., Drucker, H., Guyon, I., Müller, U., S?ckinger, E., Simard, P., Vapnik, V.: Comparison of learning algorithms for handwritten digit recognition. In: Int’l Conf. on Artificial Neural Networks, pp. 53-0 (1995)
  • 作者单位:Battista Biggio (20)
    Samuel Rota Bulò (21)
    Ignazio Pillai (20)
    Michele Mura (20)
    Eyasu Zemene Mequanint (20)
    Marcello Pelillo (22)
    Fabio Roli (20)

    20. University of Cagliari, Italy
    21. FBK-irst, Trento, Italy
    22. Ca-Foscari University, Venice, Italy
  • ISSN:1611-3349
文摘
Clustering algorithms are largely adopted in security applications as a vehicle to detect malicious activities, although few attention has been paid on preventing deliberate attacks from subverting the clustering process itself. Recent work has introduced a methodology for the security analysis of data clustering in adversarial settings, aimed to identify potential attacks against clustering algorithms and to evaluate their impact. The authors have shown that single-linkage hierarchical clustering can be severely affected by the presence of a very small fraction of carefully-crafted poisoning attacks into the input data, highlighting that the clustering algorithm may be itself the weakest link in a security system. In this paper, we extend this analysis to the case of complete-linkage hierarchical clustering by devising an ad hoc poisoning attack. We verify its effectiveness on artificial data and on application examples related to the clustering of malware and handwritten digits.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700