Defacement Detection with Passive Adversaries

A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant repu...

Full description

Bibliographic Details
Main Authors: Francesco Bergadano, Fabio Carretto, Fabio Cogno, Dario Ragno
Format: Article
Language:English
Published: MDPI AG 2019-07-01
Series:Algorithms
Subjects:
Online Access:https://www.mdpi.com/1999-4893/12/8/150
id doaj-d4cb838af3d84d6c9f0ad48429fa9622
record_format Article
spelling doaj-d4cb838af3d84d6c9f0ad48429fa96222020-11-25T01:57:17ZengMDPI AGAlgorithms1999-48932019-07-0112815010.3390/a12080150a12080150Defacement Detection with Passive AdversariesFrancesco Bergadano0Fabio Carretto1Fabio Cogno2Dario Ragno3Dipartimento di Informatica, Università di Torino, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyCertimeter Group, Corso Svizzera 185, 10149 Torino, ItalyA novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.https://www.mdpi.com/1999-4893/12/8/150adversarial learninganomaly detectiondefacement responseSecurity Incident and Event ManagementSecurity Operations Center
collection DOAJ
language English
format Article
sources DOAJ
author Francesco Bergadano
Fabio Carretto
Fabio Cogno
Dario Ragno
spellingShingle Francesco Bergadano
Fabio Carretto
Fabio Cogno
Dario Ragno
Defacement Detection with Passive Adversaries
Algorithms
adversarial learning
anomaly detection
defacement response
Security Incident and Event Management
Security Operations Center
author_facet Francesco Bergadano
Fabio Carretto
Fabio Cogno
Dario Ragno
author_sort Francesco Bergadano
title Defacement Detection with Passive Adversaries
title_short Defacement Detection with Passive Adversaries
title_full Defacement Detection with Passive Adversaries
title_fullStr Defacement Detection with Passive Adversaries
title_full_unstemmed Defacement Detection with Passive Adversaries
title_sort defacement detection with passive adversaries
publisher MDPI AG
series Algorithms
issn 1999-4893
publishDate 2019-07-01
description A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.
topic adversarial learning
anomaly detection
defacement response
Security Incident and Event Management
Security Operations Center
url https://www.mdpi.com/1999-4893/12/8/150
work_keys_str_mv AT francescobergadano defacementdetectionwithpassiveadversaries
AT fabiocarretto defacementdetectionwithpassiveadversaries
AT fabiocogno defacementdetectionwithpassiveadversaries
AT darioragno defacementdetectionwithpassiveadversaries
_version_ 1724975081635971072