Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

11/05/2018
by   Yi Shi, et al.
0

Machine learning has been applied to a broad range of applications and some of them are available online as application programming interfaces (APIs) with either free (trial) or paid subscriptions. In this paper, we study adversarial machine learning in the form of back-box attacks on online classifier APIs. We start with a deep learning based exploratory (inference) attack, which aims to build a classifier that can provide similar classification results (labels) as the target classifier. To minimize the difference between the labels returned by the inferred classifier and the target classifier, we show that the deep learning based exploratory attack requires a large number of labeled training data samples. These labels can be collected by calling the online API, but usually there is some strict rate limitation on the number of allowed API calls. To mitigate the impact of limited training data, we develop an active learning approach that first builds a classifier based on a small number of API calls and uses this classifier to select samples to further collect their labels. Then, a new classifier is built using more training data samples. This updating process can be repeated multiple times. We show that this active learning approach can build an adversarial classifier with a small statistical difference from the target classifier using only a limited number of training data samples. We further consider evasion and causative (poisoning) attacks based on the inferred classifier that is built by the exploratory attack. Evasion attack determines samples that the target classifier is likely to misclassify, whereas causative attack provides erroneous training data samples to reduce the reliability of the re-trained classifier. The success of these attacks show that adversarial machine learning emerges as a feasible threat in the realistic case with limited training data.

READ FULL TEXT
research
01/25/2019

Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data

As online systems based on machine learning are offered to public or pai...
research
10/23/2019

Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning

We present a Trojan (backdoor or trapdoor) attack that targets deep lear...
research
06/30/2020

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds

Machine learning systems that rely on training data collected from untru...
research
06/25/2021

A hybrid model-based and learning-based approach for classification using limited number of training samples

The fundamental task of classification given a limited number of trainin...
research
07/03/2018

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

An adversarial machine learning approach is introduced to launch jamming...
research
11/30/2021

Living-Off-The-Land Command Detection Using Active Learning

In recent years, enterprises have been targeted by advanced adversaries ...
research
12/25/2020

DNS Typo-squatting Domain Detection: A Data Analytics Machine Learning Based Approach

Domain Name System (DNS) is a crucial component of current IP-based netw...

Please sign up or login with your details

Forgot password? Click here to reset