Defacement Detection with Passive Adversaries
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant repu...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-07-01
|
Series: | Algorithms |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-4893/12/8/150 |
id |
doaj-d4cb838af3d84d6c9f0ad48429fa9622 |
---|---|
record_format |
Article |
spelling |
doaj-d4cb838af3d84d6c9f0ad48429fa96222020-11-25T01:57:17ZengMDPI AGAlgorithms1999-48932019-07-0112815010.3390/a12080150a12080150Defacement Detection with Passive AdversariesFrancesco Bergadano0Fabio Carretto1Fabio Cogno2Dario Ragno3Dipartimento di Informatica, Università di Torino, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyA novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.https://www.mdpi.com/1999-4893/12/8/150adversarial learninganomaly detectiondefacement responseSecurity Incident and Event ManagementSecurity Operations Center |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Francesco Bergadano Fabio Carretto Fabio Cogno Dario Ragno |
spellingShingle |
Francesco Bergadano Fabio Carretto Fabio Cogno Dario Ragno Defacement Detection with Passive Adversaries Algorithms adversarial learning anomaly detection defacement response Security Incident and Event Management Security Operations Center |
author_facet |
Francesco Bergadano Fabio Carretto Fabio Cogno Dario Ragno |
author_sort |
Francesco Bergadano |
title |
Defacement Detection with Passive Adversaries |
title_short |
Defacement Detection with Passive Adversaries |
title_full |
Defacement Detection with Passive Adversaries |
title_fullStr |
Defacement Detection with Passive Adversaries |
title_full_unstemmed |
Defacement Detection with Passive Adversaries |
title_sort |
defacement detection with passive adversaries |
publisher |
MDPI AG |
series |
Algorithms |
issn |
1999-4893 |
publishDate |
2019-07-01 |
description |
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company. |
topic |
adversarial learning anomaly detection defacement response Security Incident and Event Management Security Operations Center |
url |
https://www.mdpi.com/1999-4893/12/8/150 |
work_keys_str_mv |
AT francescobergadano defacementdetectionwithpassiveadversaries AT fabiocarretto defacementdetectionwithpassiveadversaries AT fabiocogno defacementdetectionwithpassiveadversaries AT darioragno defacementdetectionwithpassiveadversaries |
_version_ |
1724975081635971072 |