Poisoning Complete-Linkage Hierarchical Clustering

作者: Battista Biggio , Samuel Rota Bulò , Ignazio Pillai , Michele Mura , Eyasu Zemene Mequanint

DOI: 10.1007/978-3-662-44415-3_5

关键词:

摘要: Clustering algorithms are largely adopted in security applications as a vehicle to detect malicious activities, although few attention has been paid on preventing deliberate attacks from subverting the clustering process itself. Recent work introduced methodology for analysis of data adversarial settings, aimed identify potential against and evaluate their impact. The authors have shown that single-linkage hierarchical can be severely affected by presence very small fraction carefully-crafted poisoning into input data, highlighting algorithm may itself weakest link system. In this paper, we extend case complete-linkage devising an ad hoc attack. We verify its effectiveness artificial application examples related malware handwritten digits.

参考文章(25)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Leon Bottou, Leon Bottou, V. Vapnik, Yann Lecun, I. Guyon, Eduard Sackinger, Corinna Cortes, Corinna Cortes, U.A. Muller, Patrice Simard, Patrice Simard, A. Brunot, Harris Drucker, Harris Drucker, L.D. Jackel, J. S. Denker, J. S. Denker, Comparison of learning algorithms for handwritten digit recognition EC2 & Cie. pp. 53- 60 ,(1995)
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
J.G. Dutrisac, D.B. Skillicorn, Hiding clusters in adversarial settings intelligence and security informatics. pp. 185- 187 ,(2008) , 10.1109/ISI.2008.4565051
Richard C. Dubes, Anil K. Jain, Algorithms for clustering data ,(1988)
J.D. Tygar, Adversarial Machine Learning IEEE Internet Computing. ,vol. 15, pp. 4- 6 ,(2011) , 10.1109/MIC.2011.112
Roberto Perdisci, Igino Corona, Giorgio Giacinto, Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 714- 726 ,(2012) , 10.1109/TDSC.2012.35
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Roberto Perdisci, Davide Ariu, Giorgio Giacinto, Scalable fine-grained behavioral clustering of HTTP-based malware Computer Networks. ,vol. 57, pp. 487- 500 ,(2013) , 10.1016/J.COMNET.2012.06.022