Movatterモバイル変換


[0]ホーム

URL:


CN109951484B - Test method and system for attacking machine learning product - Google Patents

Test method and system for attacking machine learning product
Download PDF

Info

Publication number
CN109951484B
CN109951484BCN201910213571.6ACN201910213571ACN109951484BCN 109951484 BCN109951484 BCN 109951484BCN 201910213571 ACN201910213571 ACN 201910213571ACN 109951484 BCN109951484 BCN 109951484B
Authority
CN
China
Prior art keywords
access
machine learning
malicious
learning product
characteristic factors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910213571.6A
Other languages
Chinese (zh)
Other versions
CN109951484A (en
Inventor
钟倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co LtdfiledCriticalSichuan Changhong Electric Co Ltd
Priority to CN201910213571.6ApriorityCriticalpatent/CN109951484B/en
Publication of CN109951484ApublicationCriticalpatent/CN109951484A/en
Application grantedgrantedCritical
Publication of CN109951484BpublicationCriticalpatent/CN109951484B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The invention discloses a test method for attacking a machine learning product, which comprises the following steps of carrying out periodic attack access on the machine learning product by adopting a malicious sample test set; the method comprises the steps that a machine learning product obtains characteristic factors of a plurality of malicious access data in a malicious sample test set, analyzes the characteristic factors and carries out classification management on the characteristic factors according to an analysis result; adopting a piece of malicious access data in the malicious sample test set to carry out attack access on the machine learning product, analyzing the characteristic factors in the piece of malicious access data by the machine learning product, comparing the characteristic factors with the characteristic factors in the classified normal access characteristic value library and abnormal access characteristic value library, and judging whether the machine learning product is in normal access or abnormal access; outputting a judgment result; the invention also discloses a test system for attacking the machine learning product, and the invention further improves the safety of the machine learning product.

Description

Test method and system for attacking machine learning product
Technical Field
The invention relates to the technical field of internet security testing, in particular to a testing method and a testing system for attacking a machine learning product.
Background
With the rapid development of the internet, the security of the internet is now increasingly emphasized by people, the attack and protection means of the internet are gradually upgraded, and the rise and application of machine learning bring a great challenge to security testing. Through long-term development, the application of machine learning is already in all fields. Because the network application module made by machine learning has no test method with obvious effect, a test method for a network attacker to attack by using a machine learning product is produced.
At present, when the safety test of a machine learning product is carried out, the limitations of traditional and single test method, lack of obvious test results and the like exist.
Disclosure of Invention
In order to solve the problems in the prior art, the invention aims to provide a test method and a test system for attacking a machine learning product, wherein a large amount of malicious access data is collected to access a target network using machine learning, so that the malicious access data in a malicious sample set is changed into a judgment rule of machine learning and bypasses a detection rule of machine learning, a machine learning system is polluted, and an attacker can enjoy the functions; the safety researcher predicts that machine learning will eventually modify the code in real time based on the test method and results to avoid this hazard.
In order to achieve the purpose, the invention adopts the technical scheme that: a test method for attacking aiming at a machine learning product comprises the following steps:
the method comprises the following steps that firstly, a malicious sample test set is adopted to carry out periodic attack access on a machine learning product, wherein the malicious sample test set comprises a plurality of malicious access data;
secondly, the machine learning product obtains characteristic factors of a plurality of malicious access data in a malicious sample test set, analyzes the characteristic factors, performs classified management on the characteristic factors according to an analysis result, and judges whether the characteristic factors are placed in a normal access characteristic value library or an abnormal access characteristic value library;
thirdly, attack access is carried out on the machine learning product by adopting a piece of malicious access data in the malicious sample test set again, the machine learning product analyzes the characteristic factors in the piece of malicious access data, compares the characteristic factors with the characteristic factors in the classified normal access characteristic value library and abnormal access characteristic value library, and judges whether the access is normal access or abnormal access;
and step four, outputting a judgment result.
In a preferred embodiment, in the fourth step, if the output determination result is a normal access, it indicates that the machine learning product has a bug, and if the output determination result is an abnormal access, it indicates that the machine learning product is normal.
In another preferred embodiment, in the first step, the amount of malicious access data for performing attack access on the machine learning product is greater than the normal access amount of the machine learning product in the same period.
In another preferred embodiment, in the first step, the period of access of the malicious sample test set to the machine learning product attack is longer than that of the machine learning product defense algorithm.
The invention also provides a test system for attacking a machine learning product, which comprises:
the sample module is used for storing a malicious sample test set for attack access and training the characteristic factors of malicious access data in the malicious sample set;
the algorithm module is used for the machine learning product to acquire the characteristic factors of the malicious access data, analyze and classify the acquired characteristic factors and establish and perfect the prediction and judgment module;
the prediction judgment module comprises a normal access characteristic value library and an abnormal access characteristic value library and is used for storing the classified characteristic factors, monitoring the access logs on the machine learning product server in real time, comparing the access logs with the characteristic factors stored in the normal access characteristic value library and the abnormal access characteristic value library, and performing prediction output if abnormal access behaviors are found;
the malicious access module is used for carrying out attack access on the machine learning product by adopting a piece of malicious access data, and the malicious access data comprises characteristic factors to be predicted;
and the prediction result module is used for receiving the prediction output result of the prediction judgment module and judging whether the test of the attack access of the malicious access data in the malicious access module to the machine learning product is successful.
In a preferred embodiment, the malicious sample set is malicious access data provided manually.
The invention has the beneficial effects that: the invention utilizes the machine learning product to carry out the attack test from the network attacker, has novel angle, can attack the tested machine learning product from the angle of bypassing the machine learning algorithm, provides a new test thought for a safety researcher, provides an effective means for instantly discovering the vulnerability of the machine learning product, and finally modifies the code in real time based on the test method and the result by the safety researcher to avoid the harm, thereby ensuring the information safety of the product and the user and further improving the safety of the machine learning product; through the test of the invention, the fact that the machine Learning products based on the DQN (deep Learning-Learning) Algorithm (the deep Learning is combined with the reinforcement Learning), the TRPO (Trust Region Policy optimization) trust domain strategy optimization and the A3C (Actor-critical Algorithm) Algorithm are successfully attacked by malicious access data proves that the machine Learning products based on the Algorithm also have vulnerabilities, and a security researcher can modify the codes conveniently to improve the security of the machine Learning products.
Drawings
FIG. 1 is a block flow diagram of an embodiment of the present invention;
fig. 2 is a system block diagram of an embodiment of the invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
Example (b):
as shown in fig. 1, a testing method for attacking a machine learning product includes the following steps:
presetting conditions: the PC with the operating system of WIN7 or WIN8 or WIN10 or Linux is the attacked machine learning product server (taking a fire wall as an example);
the method comprises the following steps that firstly, a malicious sample test set is adopted to carry out periodic attack access on a machine learning product, wherein the malicious sample test set comprises a plurality of malicious access data; the number of malicious access data for performing attack access on the machine learning product is larger than the normal access amount of the machine learning product in the same period, and the period of attack access of the malicious sample test set on the machine learning product is larger than the period of a defense algorithm of the machine learning product;
secondly, the machine learning product obtains characteristic factors of a plurality of malicious access data in a malicious sample test set, analyzes the characteristic factors, performs classified management on the characteristic factors according to an analysis result, and judges whether the characteristic factors are placed in a normal access characteristic value library or an abnormal access characteristic value library; in this embodiment, a large amount of malicious access data access a tested machine learning product for a long time, so that the machine learning product obtains a large amount of malicious access data information and analyzes all malicious access data, and because the number of the malicious access data is large, the machine learning product judges the malicious access data as normal access data and extracts characteristic factors of the malicious access data to put the malicious access data into a normal access characteristic value library;
thirdly, attack access is carried out on the machine learning product by adopting a piece of malicious access data (such as < script > alert ('xss'); script >) in the malicious sample test set again, the machine learning product analyzes the characteristic factors in the piece of malicious access data, compares the characteristic factors with the characteristic factors in the classified normal access characteristic value library and abnormal access characteristic value library and judges whether the access is normal access or abnormal access;
step four, outputting a judgment result; the output of the embodiment is normal access data, which indicates that the malicious access data can be accessed by the identity of the normal data, successfully bypasses a waf (web Application firewall) firewall system of the machine learning product, pops up an XSS bullet box, and an attacker successfully attacks the machine learning product.
As shown in fig. 2, the present embodiment further provides a test system for attacking a machine learning product, including:
the sample module is used for storing a malicious sample test set for attack access and training the characteristic factors of malicious access data in the malicious sample set;
the algorithm module is used for the machine learning product to acquire the characteristic factors of the malicious access data, analyze and classify the acquired characteristic factors and establish and perfect the prediction and judgment module; in the embodiment, an attacker in the algorithm module accesses a tested machine learning product for a long time in a large amount, so that the algorithm module obtains a large amount of malicious access data information and analyzes all malicious access data;
the prediction judgment module comprises a normal access characteristic value library and an abnormal access characteristic value library and is used for storing the classified characteristic factors, monitoring the access logs on the machine learning product server in real time, comparing the access logs with the characteristic factors stored in the normal access characteristic value library and the abnormal access characteristic value library, and performing prediction output if abnormal access behaviors are found; in the embodiment, when attack access is performed on the machine learning product by adopting a piece of malicious access data (such as < script > alert ('xss');, < script >) in the malicious sample test set again, the prediction and judgment module puts the abnormal malicious access data into the normal access characteristic value library;
the malicious access module is used for carrying out attack access on the machine learning product by adopting a piece of malicious access data, and the malicious access data comprises characteristic factors to be predicted;
the prediction result module is used for receiving the prediction output result of the prediction judgment module and judging whether the test of the attack access of the malicious access data in the malicious access module to the machine learning product is successful or not; in this embodiment, the prediction result module monitors the prediction output of the prediction judgment module as normal access data, the malicious data can be accessed by the identity of the normal data, the waf (web Application firewall) firewall system of the machine learning product is successfully bypassed, an XSS box is popped up, and an attacker successfully attacks the firewall. The test result of the system to the machine learning product shows that the machine learning product has a bug.
The above-mentioned embodiments only express the specific embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.

Claims (4)

CN201910213571.6A2019-03-202019-03-20Test method and system for attacking machine learning productActiveCN109951484B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910213571.6ACN109951484B (en)2019-03-202019-03-20Test method and system for attacking machine learning product

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910213571.6ACN109951484B (en)2019-03-202019-03-20Test method and system for attacking machine learning product

Publications (2)

Publication NumberPublication Date
CN109951484A CN109951484A (en)2019-06-28
CN109951484Btrue CN109951484B (en)2021-01-26

Family

ID=67010277

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910213571.6AActiveCN109951484B (en)2019-03-202019-03-20Test method and system for attacking machine learning product

Country Status (1)

CountryLink
CN (1)CN109951484B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112311733A (en)*2019-07-302021-02-02四川大学 A method based on reinforcement learning to optimize XSS detection model to defend against adversarial attacks
CN112968891B (en)*2021-02-192022-07-08山东英信计算机技术有限公司Network attack defense method and device and computer readable storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105282091B (en)*2014-06-052017-12-12腾讯科技(深圳)有限公司The server detection method and its system of safety applications
US10237298B1 (en)*2014-06-172019-03-19Wells Fargo Bank, N.A.Session management
GB2557253B (en)*2016-12-022020-06-03F Secure CorpMachine learning based malware detection system
CN106713335B (en)*2016-12-302020-10-30山石网科通信技术股份有限公司Malicious software identification method and device
US10652261B2 (en)*2017-02-012020-05-12Splunk Inc.Computer-implemented system and method for creating an environment for detecting malicious content
US11277422B2 (en)*2017-03-012022-03-15Cujo LLCDetecting malicious network addresses within a local network
US12237053B2 (en)*2017-06-272025-02-25Grail, Inc.Detecting cross-contamination in sequencing data
CN107294993B (en)*2017-07-052021-02-09重庆邮电大学WEB abnormal traffic monitoring method based on ensemble learning
CN108491717A (en)*2018-03-282018-09-04四川长虹电器股份有限公司A kind of xss systems of defense and its implementation based on machine learning
CN108566392B (en)*2018-04-112020-10-23四川长虹电器股份有限公司Machine learning-based system and method for preventing CC attack
CN109472390B (en)*2018-09-122021-08-31郑颖尔Intelligent planning scheme generation method and system based on machine learning
CN109274677B (en)*2018-10-112021-04-27四川长虹电器股份有限公司IP classification method and system based on machine learning
CN109167798B (en)*2018-11-012020-03-17四川长虹电器股份有限公司Household Internet of things device DDoS detection method based on machine learning

Also Published As

Publication numberPublication date
CN109951484A (en)2019-06-28

Similar Documents

PublicationPublication DateTitle
Martín et al.Android malware detection through hybrid features fusion and ensemble classifiers: The AndroPyTool framework and the OmniDroid dataset
US12166786B1 (en)Malware detection verification and enhancement by coordinating endpoint and malware detection systems
Bhatt et al.Towards a framework to detect multi-stage advanced persistent threats attacks
US10581879B1 (en)Enhanced malware detection for generated objects
JP5713478B2 (en) System and method for detecting malicious processes without using signatures
EP2788912B1 (en)Predictive heap overflow protection
US9935972B2 (en)Emulator-based malware learning and detection
US8549645B2 (en)System and method for detection of denial of service attacks
Naseer et al.Malware detection: issues and challenges
CN106055981B (en) Method and device for generating threat intelligence
AlYousef et al.Dynamically detecting security threats and updating a signature-based intrusion detection system’s database
KR20080047261A (en) Atypical malware detection method and process system using process behavior prediction technique
Kaur et al.Efficient hybrid technique for detecting zero-day polymorphic worms
Huda et al.Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks
Visu et al.Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance
CN113992386A (en)Method and device for evaluating defense ability, storage medium and electronic equipment
Abuzaid et al.An efficient trojan horse classification (ETC)
CN109951484B (en)Test method and system for attacking machine learning product
Supriya et al.Malware detection techniques: A survey
Deshpande et al.Detection and notification of zero-day attack to prevent cybercrime
SinghA study on zero day malware attack
Singh et al.ZDAR system: defending against the unknown
Sirigiri et al.Malware Detection and Analysis using Machine Learning
Mahajan et al.Malware Detection and Analysis using Modern Honeypot Allied with Machine Learning: A Performance Evaluation
CN115314244B (en)White list safety protection method, device, equipment and readable storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp