论文标题
对基于ML的网络钓鱼网站分类器的高级逃避攻击和缓解
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
论文作者
论文摘要
基于机器学习(ML)的方法已成为抗捕获检测的主流解决方案。当它们部署在客户端时,基于ML的分类器容易受到逃避攻击的影响。但是,由于现有的攻击破坏了网页的功能或外观,因此这种潜在威胁受到了相对较少的关注,并且在白色盒子方案中进行了进行,从而降低了实用性。因此,必须了解是否有可能以有限的分类器知识来发射逃避攻击,同时保留功能和外观。 在这项工作中,我们表明,即使在灰色和黑色盒子场景中,逃避攻击不仅对实用的基于ML的分类器有效,而且也可以有效地启动而不会破坏功能和外观。为此,我们提出了三种基于突变的攻击,在目标分类器的知识方面有所不同,解决了一个关键的技术挑战:从已知的网站网站上自动制作对抗性样本,以误导分类器的方式。为了在白色和灰色盒子场景中发动攻击,我们还提出了基于样本的碰撞攻击,以获取目标分类器的知识。我们证明了我们对最先进的Google网络钓鱼页面过滤器的逃避攻击的有效性和效率,每个网站不到一秒钟就达到了100%的攻击成功率。此外,对Bitdefender的工业网络钓鱼页面分类器的可转移性攻击可达攻击成功率高达81.25%。我们进一步提出了一种基于相似性的方法来减轻这种逃避攻击,鹈鹕。我们证明鹈鹕可以有效地检测出逃避攻击。我们的发现有助于设计更强大的网络钓鱼网站分类器实践。
Machine learning (ML) based approaches have been the mainstream solution for anti-phishing detection. When they are deployed on the client-side, ML-based classifiers are vulnerable to evasion attacks. However, such potential threats have received relatively little attention because existing attacks destruct the functionalities or appearance of webpages and are conducted in the white-box scenario, making it less practical. Consequently, it becomes imperative to understand whether it is possible to launch evasion attacks with limited knowledge of the classifier, while preserving the functionalities and appearance. In this work, we show that even in the grey-, and black-box scenarios, evasion attacks are not only effective on practical ML-based classifiers, but can also be efficiently launched without destructing the functionalities and appearance. For this purpose, we propose three mutation-based attacks, differing in the knowledge of the target classifier, addressing a key technical challenge: automatically crafting an adversarial sample from a known phishing website in a way that can mislead classifiers. To launch attacks in the white- and grey-box scenarios, we also propose a sample-based collision attack to gain the knowledge of the target classifier. We demonstrate the effectiveness and efficiency of our evasion attacks on the state-of-the-art, Google's phishing page filter, achieved 100% attack success rate in less than one second per website. Moreover, the transferability attack on BitDefender's industrial phishing page classifier, TrafficLight, achieved up to 81.25% attack success rate. We further propose a similarity-based method to mitigate such evasion attacks, Pelican. We demonstrate that Pelican can effectively detect evasion attacks. Our findings contribute to design more robust phishing website classifiers in practice.