Pattern recognition methods offer technological background for a variety of applications in a modern information society. They are however undermined by several kinds of "adversarial" misuses like email and web spam, attacks to computer networks, etc. A classical example of such "adversarial" environment are various evasion techniques used in generation of spam emails. Similar problems arise in web search (web spam) and malware analysis (obfuscation and polymorphism). The underlying problem is that pattern recognition, as well as data analysis techniques in general, have not been designed to work in adversarial environments. This consideration arise with the problem to define a general framework to prevents this kind of evasions. In this thesis we propose some techniques to approach with the "adversarial" environments. We first present a novel multiple classifier systems approach, called SOCIAL, and then we will show some methodologies applied to different applications such as the spam detection and the traffic identification.
Multiple Classifier Systems in Adversarial Environments: "Challenges and Solutions"
2009
Abstract
Pattern recognition methods offer technological background for a variety of applications in a modern information society. They are however undermined by several kinds of "adversarial" misuses like email and web spam, attacks to computer networks, etc. A classical example of such "adversarial" environment are various evasion techniques used in generation of spam emails. Similar problems arise in web search (web spam) and malware analysis (obfuscation and polymorphism). The underlying problem is that pattern recognition, as well as data analysis techniques in general, have not been designed to work in adversarial environments. This consideration arise with the problem to define a general framework to prevents this kind of evasions. In this thesis we propose some techniques to approach with the "adversarial" environments. We first present a novel multiple classifier systems approach, called SOCIAL, and then we will show some methodologies applied to different applications such as the spam detection and the traffic identification.| File | Dimensione | Formato | |
|---|---|---|---|
|
gargiulo.pdf
accesso solo da BNCF e BNCR
Tipologia:
Altro materiale allegato
Licenza:
Tutti i diritti riservati
Dimensione
2.83 MB
Formato
Adobe PDF
|
2.83 MB | Adobe PDF |
I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/20.500.14242/338249
URN:NBN:IT:BNCF-338249