Automated Attacks on Compression-Based Classifiers
dc.contributor.advisor | Lowd, Daniel | en_US |
dc.contributor.author | Burago, Igor | en_US |
dc.date.accessioned | 2014-09-29T17:54:57Z | |
dc.date.available | 2014-09-29T17:54:57Z | |
dc.date.issued | 2014-09-29 | |
dc.description.abstract | Methods of compression-based text classification have proven their usefulness for various applications. However, in some classification problems, such as spam filtering, a classifier confronts one or many adversaries willing to induce errors in the classifier's judgment on certain kinds of input. In this thesis, we consider the problem of finding thrifty strategies for character-based text modification that allow an adversary to revert classifier's verdict on a given family of input texts. We propose three statistical statements of the problem that can be used by an attacker to obtain transformation models which are optimal in some sense. Evaluating these three techniques on a realistic spam corpus, we find that an adversary can transform a spam message (detectable as such by an entropy-based text classifier) into a legitimate one by generating and appending, in some cases, as few additional characters as 20% of the original length of the message. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/18439 | |
dc.language.iso | en_US | en_US |
dc.publisher | University of Oregon | en_US |
dc.rights | All Rights Reserved. | en_US |
dc.subject | Adversarial machine learning | en_US |
dc.subject | Compression-based classification | en_US |
dc.title | Automated Attacks on Compression-Based Classifiers | en_US |
dc.type | Electronic Thesis or Dissertation | en_US |
thesis.degree.discipline | Department of Computer and Information Science | en_US |
thesis.degree.grantor | University of Oregon | en_US |
thesis.degree.level | masters | en_US |
thesis.degree.name | M.S. | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Burago_oregon_0171N_11060.pdf
- Size:
- 234.96 KB
- Format:
- Adobe Portable Document Format