Classifier evaluation and attribute selection against active adversaries

被引:39
|
作者
Kantarcioglu, Murat [1 ]
Xi, Bowei [2 ]
Clifton, Chris [3 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[2] Purdue Univ, Dept Stat, W Lafayette, IN 47907 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
Adversarial classification; Game theory; Attribute selection; Simulated annealing;
D O I
10.1007/s10618-010-0197-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many data mining applications, such as spam filtering and intrusion detection, are faced with active adversaries. In all these applications, the future data sets and the training data set are no longer from the same population, due to the transformations employed by the adversaries. Hence a main assumption for the existing classification techniques no longer holds and initially successful classifiers degrade easily. This becomes a game between the adversary and the data miner: The adversary modifies its strategy to avoid being detected by the current classifier; the data miner then updates its classifier based on the new threats. In this paper, we investigate the possibility of an equilibrium in this seemingly never ending game, where neither party has an incentive to change. Modifying the classifier causes too many false positives with too little increase in true positives; changes by the adversary decrease the utility of the false negative items that are not detected. We develop a game theoretic framework where equilibrium behavior of adversarial classification applications can be analyzed, and provide solutions for finding an equilibrium point. A classifier's equilibrium performance indicates its eventual success or failure. The data miner could then select attributes based on their equilibrium performance, and construct an effective classifier. A case study on online lending data demonstrates how to apply the proposed game theoretic framework to a real application.
引用
收藏
页码:291 / 335
页数:45
相关论文
共 50 条
  • [1] Classifier evaluation and attribute selection against active adversaries
    Murat Kantarcıoğlu
    Bowei Xi
    Chris Clifton
    [J]. Data Mining and Knowledge Discovery, 2011, 22 : 291 - 335
  • [3] Reducing classifier overconfidence against adversaries through graph algorithms
    Teixeira, Leonardo
    Jalaian, Brian
    Ribeiro, Bruno
    [J]. MACHINE LEARNING, 2023, 112 (07) : 2619 - 2651
  • [4] Reducing classifier overconfidence against adversaries through graph algorithms
    Leonardo Teixeira
    Brian Jalaian
    Bruno Ribeiro
    [J]. Machine Learning, 2023, 112 : 2619 - 2651
  • [5] Privacy amplification secure against active adversaries
    Maurer, U
    Wolf, S
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
  • [6] RFID KEY ESTABLISHMENT AGAINST ACTIVE ADVERSARIES
    Bringer, J.
    Chabanne, H.
    Cohen, G.
    Kindarji, B.
    [J]. 2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 186 - +
  • [7] An Ensemble Classifier Based on Attribute Selection and Diversity Measure
    Shi, Hongbo
    Lv, Yali
    [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 106 - 110
  • [8] Intrusion Classifier based on Multiple Attribute Selection Algorithms
    Ren, Weiwu
    Hu, Liang
    Zhao, Kuo
    Chu, Jianfeng
    Jia, Bing
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (10) : 2536 - 2543
  • [9] An Attribute Selection Based Classifier to Predict Financial Distress
    Cheng, Ching-Hsue
    Chan, Chia-Pang
    [J]. 2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1119 - 1124
  • [10] Symmetric encryption in automatic analyses for confidentiality against active adversaries
    Laud, P
    [J]. 2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 71 - 85