Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security 2013
DOI: 10.1145/2517312.2517321
|View full text |Cite
|
Sign up to set email alerts
|

Is data clustering in adversarial settings secure?

Abstract: Clustering algorithms have been increasingly adopted in security applications to spot dangerous or illicit activities. However, they have not been originally devised to deal with deliberate attack attempts that may aim to subvert the clustering process itself. Whether clustering can be safely adopted in such settings remains thus questionable. In this work we propose a general framework that allows one to identify potential attacks against clustering algorithms, and to evaluate their impact, by making specific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
106
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 94 publications
(112 citation statements)
references
References 21 publications
0
106
0
Order By: Relevance
“…It has to be remarked that ∆DH t is not the kind of tool one hopes to employ as part of a proper informationtheoretic approach to the problem of quantifying differences between hierarchies: its sign is not constant, and there is much interaction among the summands in (15) and (16). It would be much more appropriate to construct and employ a proper notion of conditional entropy.…”
Section: Comparing Truncated Hierarchiesmentioning
confidence: 99%
See 2 more Smart Citations
“…It has to be remarked that ∆DH t is not the kind of tool one hopes to employ as part of a proper informationtheoretic approach to the problem of quantifying differences between hierarchies: its sign is not constant, and there is much interaction among the summands in (15) and (16). It would be much more appropriate to construct and employ a proper notion of conditional entropy.…”
Section: Comparing Truncated Hierarchiesmentioning
confidence: 99%
“…4, 14, 15. Given the central role of HC in cyber-security it is critical to understand and design around the vulnerabilities of hierarchical clustering methods. An interesting set of articles by Biggio et al 4,16,17 highlights a major vulnerability in HC: sensitivity to poisoning attacks. Biggio et al 4 emphasizes the centrality of clustering of malware families in the identification of common characteristics and the design of suitable countermeasures.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Capability: since poisoning samples do not need to preserve any malicious functionality, the attacker can add any number of them to the initial dataset, with the only constraint on their feature values given by feature normalization. The optimal attack strategy can be therefore formulated as We refer the reader to [23] for details on the (approximate) solution of this optimization problem. We considered three different greedy heuristics tailored to single-linkage hierarchical clustering, named Bridge (Best), Bridge (Hard), and Bridge (Soft): poisoning samples are added one at a time, until |A| points are added.…”
Section: Poisoning Http-based Malware Clusteringmentioning
confidence: 99%
“…And over 70% of the advanced malware created today uses one or more evasion techniques to avoid detection 2 . Attackers collect the knowledge of machine learning based detection approach and develop new evasion techniques, such as new communication channel [4][5][6][7][8], mimicry attack [9,10], gradient descent attack [9,10], poison attack [11], and so on.…”
Section: Introductionmentioning
confidence: 99%