Pitfalls in Machine Learning for Computer Security
Abstract
1. Introduction
2. Pitfalls in Machine Learning
2.1 Data Collection and Labeling
2.2 System Design and Learning
2.3 Performance Evaluation
2.4 Deployment and Operation
3. Prevalence Analysis
4. Impact Analysis
4.1 Mobile Malware Detection
Metric | Drebin | Opseqs | ||||
---|---|---|---|---|---|---|
Accuracy | 0.994 | 0.980 | -1.4 % % | 0.972 | 0.948 | -2.5 % % |
Precision | 0.968 | 0.930 | -3.9 % % | 0.822 | 0.713 | -13.3 % % |
Recall | 0.964 | 0.846 | -12.2 % % | 0.883 | 0.734 | -16.9 % % |
F1-Score | 0.970 | 0.886 | -8.7 % % | 0.851 | 0.722 | -15.2 % % |
MCC | 0.963 | 0.876 | -9.0 % % | 0.836 | 0.695 | -16.9 % % |
4.2 Vulnerability Discovery
Model | # parameters | AUC | TPR |
---|---|---|---|
VulDeePecker | 1.2 × 106 | 0.984 | 0.818 |
SVM | 6.6 × 104 | 0.986 | 0.963 |
AutoSklearn | 8.5 × 105 | 0.982 | 0.894 |
4.3 Source Code Author Attribution
4.4 Network Intrusion Detection
4.5 Takeaways
5. Conclusion
Acknowledgements
Footnotes
References
Index Terms
- Pitfalls in Machine Learning for Computer Security
Recommendations
Computer Security and Machine Learning: Worst Enemies or Best Friends?
SYSSEC '11: Proceedings of the 2011 First SysSec WorkshopComputer systems linked to the Internet are confronted with a plethora of security threats, ranging from classic computer worms to involved drive-by downloads and bot networks. In the last years these threats have reached a new quality of automatization ...
Machine learning and the Internet of Things security: Solutions and open challenges
Highlights- Emphasizing security challenges and requirements of IoT-based systems.
- ...
AbstractInternet of Things (IoT) is a pervasively-used technology for the last few years. IoT technologies are also responsible for intensifying various everyday smart applications improving the standard of living. However, the inter-crossing ...
Machine Learning for Enterprise Security
AISec '15: Proceedings of the 8th ACM Workshop on Artificial Intelligence and SecurityEnterprise security is about protecting an enterprise's computing infrastructure and the enterprise's sensitive information stored and processed by the infrastructure. We secure the infrastructure and the information by combining three steps: (a) ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 1,951Total Downloads
- Downloads (Last 12 months)1,951
- Downloads (Last 6 weeks)330
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderDigital Edition
View this article in digital edition.
Digital EditionMagazine Site
View this article on the magazine site (external)
Magazine SiteLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in