Starije izmjene na obje strane
Starija izmjena
Novija izmjena
|
Starija izmjena
|
racfor_wiki:primjene_strojnog_ucenja_u_cyber_sigurnosti [2021/01/17 13:38] mpuhalovic [Security of Machine Learning] |
racfor_wiki:primjene_strojnog_ucenja_u_cyber_sigurnosti [2024/12/05 12:24] (trenutno) |
* Attacks on availability - cause so many classification errors that the system becomes effectively unusable | * Attacks on availability - cause so many classification errors that the system becomes effectively unusable |
* Exploratory attacks - exploiting the existing vulnerabilities | * Exploratory attacks - exploiting the existing vulnerabilities |
* Targeted attacks directed to a certain input; | * Targeted attacks - directed to a certain input |
* Indiscriminate attacks - in which inputs fail. | * Indiscriminate attacks - causes all inputs to fail |
| |
The researchers [10] proposed the Reject On Negative Impact (RONI) defense which ignores all the training data points that have a substantial negative impact on the classification accuracy. | |
RONI defense system consists of two classifiers. One classifier is trained using the base training set and the other is trained with the base set and potentially malicious data. If the errors of those two classifiers differ significantly from each other the data is labeled as malicious. | |
RONI defense defends against exploratory and causative attacks. For defending against exploratory attacks, in which an attacker can create an evaluation distribution that the learner predicts poorly, the defender can limit the access to the training procedure and data, making it harder for an attacker to apply reverse engineering. For defending against the causative attacks, in which an attacker can manipulate both training and evaluation distributions, the defender can employ previously described defense using two classifiers. | |
| |
| The researchers [10] proposed a defense against exploratory and causative attacks. |
| For defending against exploratory attacks, in which an attacker can create an evaluation distribution that the learner predicts poorly, the defender can limit the access to the training procedure and data, making it harder for an attacker to apply reverse engineering. |
| For defending against the causative attacks, in which an attacker can manipulate both training and evaluation distributions, the defender can employ Reject On Negative Impact (RONI) defense. RONI defense ignores all the training data points that have a substantial negative impact on classification accuracy. RONI defense consists of two classifiers. One classifier is trained using the base training set and the other is trained with the base set and potentially malicious data. If the errors of those two classifiers differ significantly from each other the data is labeled as malicious. |
| |
===== Conclusion ===== | ===== Conclusion ===== |
| |
Machine learning is a powerful and adaptive tool that enabled tackling problems that so far required humans. It also enabled the automation of threat recognition tasks. | Machine learning is a powerful and adaptive tool that enabled tackling problems that so far required humans. It also enabled the automation of threat recognition tasks. In this paper, multiple applications of machine learning in cybersecurity were shown. Most of the problems were solved using supervised learning and classification since their required classifying input into safe or malicious categories. For classification tasks, researchers tested multiple classifiers, each with its own pros and cons, and they chose what they considered the best ones for the task at hand. |
| |
===== Literatura ===== | |
| |
[1] [[https://www.researchgate.net/publication/283083699_Applications_of_Machine_Learning_in_Cyber_Security|Ford, V., and Siraj A. Applications of Machine Learning in Cyber Security. Computer Science Department, Tennessee Tech University, 2014., accessed on January 2020.]] | ===== Literature ===== |
| |
[2] [[https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2017/rise-of-the-machines-preliminaries-wp-new-template-final_web.pdf|Matt Lewis. Rise of the machines: Machine Learning & its cyber security applications. NCC Group, 2017., accessed on January 2020.]] | [1] [[https://www.researchgate.net/publication/283083699_Applications_of_Machine_Learning_in_Cyber_Security|Ford, V., and Siraj, A. Applications of Machine Learning in Cyber Security. Computer Science Department, Tennessee Tech University, 2014. Accessed in January 2021.]] |
| |
[3] [[https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=633583|Spring, J., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L. B., and Stoner, E. Machine Learning in Cybersecurity: A Guide. Software Engineering Institute, 2019., accessed on January 2020.]] | [2] [[https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2017/rise-of-the-machines-preliminaries-wp-new-template-final_web.pdf|Matt Lewis. Rise of the machines: Machine Learning & its cyber security applications. NCC Group, 2017. Accessed in January 2021.]] |
| |
| [3] [[https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=633583|Spring, J., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L. B., and Stoner, E. Machine Learning in Cybersecurity: A Guide. Software Engineering Institute, 2019. Accessed in January 2021.]] |
| |
[4] https://arxiv.org/abs/1906.05799 | [4] [[https://arxiv.org/abs/1906.05799|Nguyen, T. T. and Reddi, V. J. Deep Reinforcement Learning for Cyber Security. 2020. Accessed in January 2021.]] |
| |
[5] https://papers.nips.cc/paper/2004/file/283085d30e10513624c8cece7993f4de-Paper.pdf | [5] [[https://papers.nips.cc/paper/2004/file/283085d30e10513624c8cece7993f4de-Paper.pdf|Chellapilla, K. and Simard, P. Y. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). Microsoft Research. Accessed in January 2021.]] |
| |
[6]https://eprints.whiterose.ac.uk/128366/1/MalwareAnalysis.pdf | [6] [[https://eprints.whiterose.ac.uk/128366/1/MalwareAnalysis.pdf|Milošević, N., Dehghantanha, A. and Choo, K.-K.R. Machine learning aided malware classification of Android applications. 2017. Accessed in January 2021.]] |
| |
[7] https://www.researchgate.net/publication/216864662_A_machine_learning_approach_to_keystroke_dynamics_based_user_authentication | [7][[https://www.researchgate.net/publication/216864662_A_machine_learning_approach_to_keystroke_dynamics_based_user_authentication|Revett, K., Gorunescu, F., Gorunescu, M. and Ene, M. A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics. 2007. Accessed in January 2021.]] |
| |
[8] https://www.usenix.org/legacy/events/sec08/tech/full_papers/gu/gu_html/index.html | [8][[https://www.usenix.org/legacy/events/sec08/tech/full_papers/gu/gu_html/index.html|Gu, G., Perdisci, R., Zhang, J., and Lee, W. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. College of Computing, Georgia Institute of Technology. Accessed in January 2021.]] |
| |
[9] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.114.1242&rep=rep1&type=pdf | [9][[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.114.1242&rep=rep1&type=pdf|Abu-Nimeh, S., Nappa, D., Wang, X. and Nair, S. A Comparison of Machine Learning Techniques for Phishing Detection. SMU HACNet Lab, Southern Methodist University. 2007. Accessed in January 2021.]] |
| |
[10] https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf | [10][[https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf|Barreno, M., Nelson, B. Joseph, A. D., Tygar, J.D. The security of machine learning. Computer Science Division, University of California, Berkeley. 2008. Accessed in January 2021.]] |
| |