首页> 外文会议>IEEE Global Communications Conference >ECEM - Generating Adversarial Logs under Black-box Setting in Web Security
【24h】

ECEM - Generating Adversarial Logs under Black-box Setting in Web Security

机译:在Web安全中的黑匣子设置下的ECEM - 生成对抗日志

获取原文

摘要

Researchers are making efforts on detection and prevention in web security by deploying machine learning models, but such models are vulnerable to adversarial examples. We introduce Exploratory Character Edit Method (ECEM), requiring only detection labels to generate adversarial logs in web security. It is applicable to real-world black-box detection models, such as an IDS (Intrusion Detection System). Experiments on an open data set show that our adversarial attack outperforms two textual adversarial attacks in following points: (1) The success rate of attack is higher; (2) The quality of adversarial examples are higher (larger similarity and smaller distance); (3) The generation process requires fewer iterations; We further show the consequences of causative attacks by injecting adversarial logs into the training data set and a possible defensive mechanism with adversarial training.
机译:研究人员正在通过部署机器学习模型来努力通过部署机器学习模型进行检测和预防,但这种模型容易受到对抗的例子。我们介绍探索性字符编辑方法(ECEM),只需要检测标签以在Web安全性中生成对冲日志。它适用于现实世界的黑箱检测模型,例如ID(入侵检测系统)。开放数据集的实验表明,我们的对抗攻击在以下几点上表现出两种文本对抗性攻击:(1)成功率较高; (2)对逆势实例的质量较高(相似性较大,距离较小); (3)生成过程需要较少的迭代;我们进一步展示了通过将对抗性日志注入培训数据集和具有对抗培训的可能防御机制来展示致病性攻击的后果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号