首页> 外文会议>IEEE International Symposium on Signal Processing and Information Technology >Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data
【24h】

Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data

机译:具有有限培训数据的黑盒API攻击的生成对抗网络

获取原文

摘要

As online systems based on machine learning are offered to public or paid subscribers via application programming interfaces (APIs), they become vulnerable to frequent exploits and attacks. This paper studies adversarial machine learning in the practical case when there are rate limitations on API calls. The adversary launches an exploratory (inference) attack by querying the API of an online machine learning system (in particular, a classifier) with input data samples, collecting returned labels to build up the training data, and training an adversarial classifier that is functionally equivalent and statistically close to the target classifier. The exploratory attack with limited training data is shown to fail to reliably infer the target classifier of a real text classifier API that is available online to the public. In return, a generative adversarial network (GAN) based on deep learning is built to generate synthetic training data from a limited number of real training data samples, thereby extending the training data and improving the performance of the inferred classifier. The exploratory attack provides the basis to launch the causative attack (that aims to poison the training process) and evasion attack (that aims to fool the classifier into making wrong decisions) by selecting training and test data samples, respectively, based on the confidence scores obtained from the inferred classifier. These stealth attacks with small footprint (using a small number of API calls) make adversarial machine learning practical under the realistic case with limited training data available to the adversary.
机译:由于基于机器学习的在线系统通过应用程序编程接口(API)向公共或付费用户提供给公共或付费用户,他们变得容易频繁的利用和攻击。本文在实际情况下,在实际情况下,对API呼叫的速率限制进行对抗机器学习。对手通过用输入数据样本查询在线机器学习系统(特别是分类器)的API来启动探索性(推理)攻击,收集返回的标签以建立培训数据,并培训具有功能等同的逆势分类器并统计地靠近目标分类器。有限培训数据的探索性攻击被证明无法可靠地推断出在网上提供的真实文本分类器API的目标分类器。作为返回,基于深度学习的生成的对抗性网络(GAN)是为了从有限数量的实数训练数据样本生成合成训练数据,从而扩展训练数据并提高推断分类器的性能。探索性攻击为推出致病性攻击提供了基础(旨在毒害培训过程)和逃避攻击(旨在通过选择培训和测试数据样本,基于置信度分数来欺骗攻击(旨在欺骗分类器做出错误的决定)从推断的分类器获得。这些隐形攻击小占地面积(使用少数API呼叫)使对抗性机器学习在实际情况下具有有限的培训数据可供对手提供。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号