Enabling Fair ML Evaluations for Security

Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

267 Downloads (Pure)

Abstract

Machine learning is widely used in security research to classify malicious activity, ranging from malware to malicious URLs and network traffic. However, published performance numbers often seem to leave little room for improvement and, due to a wide range of datasets and configurations, cannot be used to directly compare alternative approaches; moreover, most evaluations have been found to suffer from experimental bias which positively inflates results. In this manuscript we discuss the implementation of Tesseract, an open-source tool to evaluate the performance of machine learning classifiers in a security setting mimicking a deployment with typical data feeds over an extended period of time. In particular, Tesseract allows for a fair comparison of different classifiers in a realistic scenario, without disadvantaging any given classifier. Tesseract is available as open-source to provide the academic community with a way to report sound and comparable performance results, but also to help practitioners decide which system to deploy under specific budget constraints.
Original languageEnglish
Title of host publicationProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Pages2264-2266
ISBN (Electronic)9781450356930
DOIs
Publication statusPublished - 15 Oct 2018

Publication series

NameProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security

Keywords

  • Malware, Machine Learning, Experimental Bias

Fingerprint

Dive into the research topics of 'Enabling Fair ML Evaluations for Security'. Together they form a unique fingerprint.

Cite this