首页> 外文期刊>Journal of computer security >Directed adversarial sampling attacks on phishing detection
【24h】

Directed adversarial sampling attacks on phishing detection

机译:针对网络钓鱼检测的针对对抗的采样攻击

获取原文
获取原文并翻译 | 示例

摘要

Phishing websites trick honest users into believing that they interact with a legitimate website and capture sensitive information, such as user names, passwords, credit card numbers, and other personal information. Machine learning is a promising technique to distinguish between phishing and legitimate websites. However, machine learning approaches are susceptible to adversarial learning attacks where a phishing sample can bypass classifiers. Our experiments on publicly available datasets reveal that the phishing detection mechanisms are vulnerable to adversarial learning attacks. We investigate the robustness of machine learning-based phishing detection in the face of adversarial learning attacks.We propose a practical approach to simulate such attacks by generating adversarial samples through direct feature manipulation. To enhance the sample's success probability, we describe a clustering approach that guides an attacker to select the best possible phishing samples that can bypass the classifier by appearing as legitimate samples. We define the notion of vulnerability level for each dataset that measures the number of features that can be manipulated and the cost for such manipulation. Further, we clustered phishing samples and showed that some clusters of samples are more likely to exhibit higher vulnerability levels than others. This helps an adversary identify the best candidates of phishing samples to generate adversarial samples at a lower cost. Our finding can be used to refine the dataset and develop better learning models to compensate for the weak samples in the training dataset.
机译:钓鱼网站欺骗诚实的用户相信它们相互作用与合法网站和捕捉敏感信息,比如用户名,密码,信用卡号码和其他个人信息。机器学习是一种很有前途的技术钓鱼和合法的网站区别开来。然而,机器学习方法易受对抗性学习攻击其中网络钓鱼样品可以绕过分类器。我们可公开获得的数据集实验显示,网络钓鱼检测机制,很容易受到敌对学习攻击。我们调查基于机器学习的网络钓鱼检测的对抗性学习attacks.We面对的稳健性提出通过直接操纵特性产生对抗样本来模拟这种攻击的实用方法。为了提高样品的成功概率,我们描述了一个聚类方法,引导攻击者能够选择最佳的可能是仿冒样品,它们可以绕过被显示为合法的样本分类。我们定义的漏洞级别的概念,对测量的可操控功能的数量以及这种操作的成本每个数据集。此外,我们聚集仿冒样品,结果表明样品的一些集群比他人更容易表现出较高的漏洞级别。这有助于敌方识别钓鱼样本以更低的成本来产生对抗性样品的最佳人选。我们的发现可用于改进数据集,开发出更好的学习模式,以弥补训练数据集弱样本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号