A survey of game theoretic approach for adversarial machine learning

被引:33
|
作者
Zhou, Yan [1 ]
Kantarcioglu, Murat [1 ]
Xi, Bowei [2 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, 2601 N Floyd Rd, Richardson, TX 75080 USA
[2] Purdue Univ, Dept Stat, W Lafayette, IN 47907 USA
关键词
adversarial machine learning; game theory;
D O I
10.1002/widm.1259
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The field of machine learning is progressing at a faster pace than ever before. Many organizations leverage machine learning tools to extract useful information from a massive amount of data. In particular, machine learning finds its application in cybersecurity that begins to enter the age of automation. However, machine learning applications in cybersecurity face unique challenges other domains rarely do-attacks from active adversaries. Problems in areas such as intrusion detection, banking fraud detection, spam filtering, and malware detection have to face challenges of adversarial attacks that modify data so that malicious instances would evade detection by the learning systems. The adversarial learning problem naturally resembles a game between the learning system and the adversary. In such a game, both players would attempt to play their best strategies against each other while maximizing their own payoffs. To solve the game, each player would search for an optimal strategy against the opponent based on the prediction of the opponent's strategy choice. The problem becomes even more complicated in settings where the learning system may have to deal with many adversaries of unknown types. Applying game-theoretic approach, robust learning techniques have been developed to specifically address adversarial attacks and the preliminary results are promising. In this review, we summarize these results. This article is categorized under: Technologies > Machine Learning Fundamental Concepts of Data and Knowledge > Key Design Issues in Data Mining
引用
收藏
页数:9
相关论文
共 50 条
  • [31] A Unified Game-Theoretic Approach to Multiagent Reinforcement Learning
    Lanctot, Marc
    Zambaldi, Vinicius
    Gruslys, Audrunas
    Lazaridou, Angeliki
    Tuyls, Karl
    Perolat, Julien
    Silver, David
    Graepel, Thore
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [32] An Adversarial Learning Approach for Machine Prognostic Health Management
    Huang, Yu
    Tang, Yufei
    VanZwieten, James
    Liu, Jianxun
    Xiao, Xiaocong
    [J]. 2019 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE BIG DATA AND INTELLIGENT SYSTEMS (HPBD&IS), 2019, : 163 - 168
  • [33] A Survey of Game-Theoretic Approach for Resource Management in Cloud Computing
    Agbaje, M. O.
    Ohwo, O. B.
    Ayanwola, T. G.
    Olufunmilola, Ogunyolu
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2022, 2022
  • [34] Network Traffic Obfuscation: An Adversarial Machine Learning Approach
    Verma, Gunjan
    Ciftcioglu, Ertugrul
    Sheatsley, Ryan
    Chan, Kevin
    Scott, Lisa
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 413 - 418
  • [35] Can machine learning model with static features be fooled: an adversarial machine learning approach
    Rahim Taheri
    Reza Javidan
    Mohammad Shojafar
    P. Vinod
    Mauro Conti
    [J]. Cluster Computing, 2020, 23 : 3233 - 3253
  • [36] A Unified Game-Theoretic Interpretation of Adversarial Robustness
    Ren, Jie
    Zhang, Die
    Wang, Yisen
    Chen, Lu
    Zhou, Zhanpeng
    Chen, Yiting
    Cheng, Xu
    Wang, Xin
    Zhou, Meng
    Shi, Jie
    Zhang, Quanshi
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021,
  • [37] Can machine learning model with static features be fooled: an adversarial machine learning approach
    Taheri, Rahim
    Javidan, Reza
    Shojafar, Mohammad
    Vinod, P.
    Conti, Mauro
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3233 - 3253
  • [38] Validating Game-Theoretic Models of Terrorism: Insights from Machine Learning
    Bang, James T.
    Basuchoudhary, Atin
    Mitra, Aniruddha
    [J]. GAMES, 2021, 12 (03):
  • [39] An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management
    Alharbi, Talal
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 390 - 399
  • [40] Adversarial Machine Learning
    Tygar, J. D.
    [J]. IEEE INTERNET COMPUTING, 2011, 15 (05) : 4 - 6