Approaches to Adversarial Drift Alex Kantchelian, Sadia Afroz, Ling - - PowerPoint PPT Presentation

approaches to adversarial drift
SMART_READER_LITE
LIVE PREVIEW

Approaches to Adversarial Drift Alex Kantchelian, Sadia Afroz, Ling - - PowerPoint PPT Presentation

Approaches to Adversarial Drift Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph & J. D. Tygar Elham Baqazi CISC850 Cyber Analytics Outline


slide-1
SLIDE 1

Approaches to Adversarial Drift

Elham Baqazi

CISC850 Cyber Analytics Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph & J. D. Tygar

slide-2
SLIDE 2

Outline

  • Challenges of applying ML systems for security

applications

  • Exploratory & Causative attack
  • Families Isolation & Responsiveness
  • Data Exploration
slide-3
SLIDE 3

Adversarial Drift

  • Designing changes to evade the classifier

immediately or to make future evasion easier

  • Handling the adversarial drift
slide-4
SLIDE 4

Machine learning in Security Application

CISC850 Cyber Analytics

  • One-Shot Approach
  • Training data
  • Building the model
  • Testing data
slide-5
SLIDE 5

Problem Statement

CISC850 Cyber Analytics

  • Security Apps data: Big & non-stationary data,

drift over the time

  • The typical ML approach fail
slide-6
SLIDE 6

Proposed Solution

CISC850 Cyber Analytics

  • Designing adaptive, adversarial-resistant ML systems
  • Ensemble of classifiers
  • Responsive classifier
slide-7
SLIDE 7

Formalism

  • Retraining the system to learn from new instances
  • Producing a series of models Ht
  • Ht (xi) = c(xi) [correctly classifies ]
slide-8
SLIDE 8

Population Drift

  • Xt (x) is the probability of encountering

instance “x” at time t

  • Adversaries post new malware Xt+1
  • Population Drift  Xt != Xt’
slide-9
SLIDE 9

Types of Attacks

  • Exploratory attacks
  • Causative attacks
slide-10
SLIDE 10

Exploratory Attacks

https://mascherari.press/introduction-to-adversarial-machine-learning/

slide-11
SLIDE 11

Causative Attacks

https://mascherari.press/introduction-to-adversarial-machine-learning/

slide-12
SLIDE 12

Families and Isolation

https://www.researchgate.net/figure/5850993_fig7_Architecture-of-the-ensemble-of-Support-Vector-Machine-classifiers-A-collection-of-m-SVM

slide-13
SLIDE 13

Families and Isolation

  • Training classifiers
  • One-vs-all method
  • One-vs-good method
  • Isolation
  • Combining classification
slide-14
SLIDE 14

Responsiveness

  • Why it being overlooked?
  • Zero training error , poor generalization
  • Unreliable training data.
  • Wrapped ML algorithm
  • Blacklist & Whitelist
slide-15
SLIDE 15

Evaluation

  • Executable malware dataset with chronological

appearance for each instance.

  • Demonstrating the importance of temporal

drift in a very adversarial environment.

  • Improving the robustness of ML algorithms.
slide-16
SLIDE 16

Data Exploration - Dataset

  • Sampled from two stratums :
  • TimeStamp, Label , Feature vector
slide-17
SLIDE 17

Top 10 Families

slide-18
SLIDE 18

Experiments – Approach

  • An empirical loss minimization approach
slide-19
SLIDE 19

Data Exploration – Experiments 1

  • Splitting the dataset into two epochs [mid-April],

60,000 malware in each period

  • Train two-class SVM models
  • Regularization factor: 10−5 < C < 1
  • False Positive Rate (FPR) < 1%
  • Calculating the Performance by two ways
slide-20
SLIDE 20
slide-21
SLIDE 21

Result 1 _ conclusion

  • The evaluation of ML based on security system

should

  • Temporal nature of the instances
  • Avoid Random-cross-validation
slide-22
SLIDE 22

Data Exploration – Experiments 2

  • Fixed the testing set [most recent instances]
  • Train SVM models
  • Constant C = 10−4
  • Constant FPR < 1%
  • Ignore the temporal order
slide-23
SLIDE 23
slide-24
SLIDE 24

Conclusion

  • Drift must be organized to limit the impact of

campaigns

  • Zero training error of high-impact instance means

correctly classification

  • Drift and temporal order must be respected in term of

detector accuracy

slide-25
SLIDE 25

Thank you Questions?