Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Algorithms  /  Vol: 12 Par: 8 (2019)  /  Artículo
ARTÍCULO
TITULO

Defacement Detection with Passive Adversaries

Francesco Bergadano    
Fabio Carretto    
Fabio Cogno and Dario Ragno    

Resumen

A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector?s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier?s behaviour. We achieve this goal by introducing a secret key?a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm?s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.

 Artículos similares

       
 
Juan Murillo-Morera, Carlos Castro-Herrera, Javier Arroyo, Ruben Fuentes-Fernandez     Pág. 114 - 137
Today, it is common for software projects to collect measurement data through development processes. With these data, defect prediction software can try to estimate the defect proneness of a software module, with the objective of assisting and guiding so... ver más

 
Jose M. Bernal-de-Lázaro     Pág. 74 - 81
This article summarizes the main contributions of the PhD thesis titled: "Application of learning techniques based on kernel methods for the fault diagnosis in Industrial processes". This thesis focuses on the analysis and design of fault diagnosis syste... ver más

 
Hugo López-Fernández     Pág. 22 - 25
Mass spectrometry using matrix assisted laser desorption ionization coupled to time of flight analyzers (MALDI-TOF MS) has become popular during the last decade due to its high speed, sensitivity and robustness for detecting proteins and peptides. This a... ver más

 
Chunling Wang, Tianyi Hang, Changke Zhu and Qi Zhang    
The Czech Republic is one of the countries along the Belt and Road Initiative, and classifying land cover in the Czech Republic helps to understand the distribution of its forest resources, laying the foundation for forestry cooperation between China and... ver más
Revista: Applied Sciences

 
Madhav Mukherjee, Ngoc Thuy Le, Yang-Wai Chow and Willy Susilo    
As the demand for cybersecurity experts in the industry grows, we face a widening shortage of skilled professionals. This pressing concern has spurred extensive research within academia and national bodies, who are striving to bridge this skills gap thro... ver más
Revista: Information