{"title":"一种评估安全解决方案鲁棒性的对抗机器学习方法","authors":"Ciprian-Alin Simion, Dragos Gavrilut, H. Luchian","doi":"10.1109/SYNASC49474.2019.00028","DOIUrl":null,"url":null,"abstract":"Cyber-Security industry has always been a \"cat and a mouse\" game - whenever a new technology was developed it was shortly followed by the appearance of several techniques used by malware creators to avoid detection. It is no surprise that the developing of adversarial machine learning algorithms has provided a tool that can be used to avoid machine learning based detection mechanisms available in security products. This paper presents how the same algorithms can also be used to strengthen a security solution by identifying its weak points / features. We will also provide a method that can be used to fight Generative Adversarial Networks (GANs) with GANs, that is effective when a malware writer is using these methods to avoid detection.","PeriodicalId":102054,"journal":{"name":"2019 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Adversarial Machine Learning Approach to Evaluate the Robustness of a Security Solution\",\"authors\":\"Ciprian-Alin Simion, Dragos Gavrilut, H. Luchian\",\"doi\":\"10.1109/SYNASC49474.2019.00028\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber-Security industry has always been a \\\"cat and a mouse\\\" game - whenever a new technology was developed it was shortly followed by the appearance of several techniques used by malware creators to avoid detection. It is no surprise that the developing of adversarial machine learning algorithms has provided a tool that can be used to avoid machine learning based detection mechanisms available in security products. This paper presents how the same algorithms can also be used to strengthen a security solution by identifying its weak points / features. We will also provide a method that can be used to fight Generative Adversarial Networks (GANs) with GANs, that is effective when a malware writer is using these methods to avoid detection.\",\"PeriodicalId\":102054,\"journal\":{\"name\":\"2019 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYNASC49474.2019.00028\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNASC49474.2019.00028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Adversarial Machine Learning Approach to Evaluate the Robustness of a Security Solution
Cyber-Security industry has always been a "cat and a mouse" game - whenever a new technology was developed it was shortly followed by the appearance of several techniques used by malware creators to avoid detection. It is no surprise that the developing of adversarial machine learning algorithms has provided a tool that can be used to avoid machine learning based detection mechanisms available in security products. This paper presents how the same algorithms can also be used to strengthen a security solution by identifying its weak points / features. We will also provide a method that can be used to fight Generative Adversarial Networks (GANs) with GANs, that is effective when a malware writer is using these methods to avoid detection.