What's behind this model?
Fernando Martínez-Plumed, Raül Fabra, Cèsar Ferri, José Hernández-Orallo, Mª Jose Ramírez Quintana
What's behind this model? Fernando Martnez-Plumed, Ral Fabra, Csar - - PowerPoint PPT Presentation
What's behind this model? Fernando Martnez-Plumed, Ral Fabra, Csar Ferri, Jos Hernndez-Orallo, M Jose Ramrez Quintana Context: Security Issues and Machine Learning Machine learning is being increasingly used in
Fernando Martínez-Plumed, Raül Fabra, Cèsar Ferri, José Hernández-Orallo, Mª Jose Ramírez Quintana
increasingly used in confidential and security-sensitive applications (such as spam, fraud detection, malware classification, network anomaly detection):
publicly accessible query interfaces.
actively manipulated by an intelligent, adaptive adversary.
An adversary that can learn the model can also often evade detection
If f(x) is just a class label:
queries
Membership queries (to find points close to f ’s decision boundary)
Black-box oracle access with membership queries that return just the predicted class label.
Idea: sampling m points, querying the oracle, and training a model f’ on these samples.
Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications (pp. 105-153). Springer International Publishing.
Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles. arXiv:1612.01401
Radford, Alec, Luke Metz, and Soumith Chintala. arXiv preprint arXiv:1511.06434 (2015).
type of ML model used as well as its intrinsic characteristics so that they can evade it or exploit its weaknesses, vulnerabilities or gaps.
We plan to start with a small set of ML families (decision trees, set of rules, linear discriminants)
Dataset Orig Evaluation Oracle/Mimetic comparison Algorithm Recommendation Evaluation
ML Algorithms:
Decision tree Logistic Regression ...
Meta-features
Meta-features LEARNING MIMETIC TREES META-LEARNING FOR ALGORITHM IDENTIFICATION
C1 C2 CN Query Strategies:
Uniform Optimum size Papernot Oracle models
M1 M2 MN Meta-feature Extraction
Mimetic datasets (artificial)
DN Mimetic D2 Mimetic D1 Mimetic ß1, ß2, …, ßY (from Mimetic DS) λ1, λ2, …, λX (from Mimetic Model)
Mimetic Classifiers (Decision Trees)