Analysis on Security Evaluation of Pattern Classifiers under Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. In these applications data can be purposely manipulated by humans to undermine their operation. This adversarial scenario’s exploitation may sometimes affect their performance, systems may exhibit vulnerabilities and limit their practical utility. This adversarial scenario is not taken into account by classical design methods. These Applications have an intrinsic adversarial nature since the input data can be purposely manipulated by an intelligent and adaptive adversary to undermine classifier operation. This often gives rise to an arms race between the adversary and the classifier designer. The system evaluates at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. A generalize framework is used for evaluation of classifier security that formalizes and generalizes the training and testing datasets, to discriminate between a “legitimate” and a “malicious” pattern class Training and Testing sets have been obtained from distribution using a classical reassembling technique like bootstrapping or cross validation. Security evaluation can be carried out by averaging the performance of the trained and tested data.
Authors and Affiliations
Rupali B. Navalkar, Prof. Rajeshri R. Shelke
slugFuzzy Base Enhanced LEACH IN WSN
Wireless sensor networks (WSN) are highly distributed networks of autonomous small, lightweight sensors (nodes) in large numbers to monitor physical or environmental conditions by the measurement of, temperature, vibrat...
Supervising Real Time Vital Signs of a Patient Using Fuzzy Logic
Over the last few decades healthcare monitoring systems have become a major concern thereby drawing attention of researchers worldwide. Due to increasing technology, the online telemedicine has proved to be cost-effecti...
Comparative Analysis of Different Methods of Tuning Load Frequency Control Problem
This paper studies control of load frequency in single area power systems with Ziegler-Nicholas PID controller. In this study, Ziegler-Nicholas PID controller is used to determine the parameters of the Ziegler-Nicholas...
Analysis of Facts Controllers in Transmission Lines
This paper main aim to lightning in FACTS controller devices which can be effectively used for power flow control, load sharing among parallel corridors, voltage regulation, enhancement of transient stability and mitiga...
slugTriple Security of File System of Cloud Computing
Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. The most prevalen...