SlideShare a Scribd company logo
1 of 6
Based on the IEEE TRANSACTIONS ON KNOWLEDGE AND DATA 
ENGINEERING, NO. 99, may 2014 paper 
Security evaluation of pattern classifiers under attack
Abstract 
 Pattern classification systems are commonly used in adversarial 
applications, like biometric authentication, network intrusion 
detection, and spam filtering, in which data can be purposely 
manipulated by humans to undermine their operation. As this 
adversarial scenario is not taken into account by classical design 
methods, pattern classification systems may exhibit vulnerabilities, 
whose exploitation may severely affect their performance, and 
consequently limit their practical utility. Extending pattern 
classification theory and design methods to adversarial settings is thus 
a novel and very relevant research direction, which has not yet been 
pursued 
 A systematic way. In this paper, we address one of the main open 
issues: evaluating at design phase the security of pattern classifiers, 
namely, the performance degradation under potential attacks they may 
incur during operation. We propose a framework for empirical 
evaluation of classifier security that formalizes and generalizes the 
main ideas proposed in the literature, and give examples of its use in 
three real applications. Reported results show that security evaluation 
can provide a more complete understanding of the classifier’s behavior 
in adversarial environments, and lead to better design choices
Proposed System 
 In our proposed system, high effective authentication with the purpose 
of log on to the email service securely and efficient spamming are 
taken into consideration. 
 Authentication in the form of fractal detection and recognition after 
contour detection of the face using the image of the user is introduced. 
 Since fractal detection and recognition is a unique method to identify 
every human being, this concept is more effective in terms of 
authenticating into the service. 
 Pattern classifiers such as Keywords and URL’s for data check, tag 
construction and keyword identity, automatic readings of mails are the 
concepts used in this system. 
 Administrator of the email service uses the pattern classifiers and 
maintains a repository to filter out spam domains and keywords. Hence 
this perception spam’s the frequent surplus mails from same domain 
with different mail id. 
 Automatic reading of mails to examine the spammed keyword is an 
intriguing conception introduced in this system to overcome many 
flaws in case of spam filtering.
Existing System 
 Message passing through emails is one the well-known way of today’s 
world since it is more effective and fast than any other sources. 
 Authentication is the major part often involves verifying the validity of 
at least one form of identifications of the users. 
 Normally authentications for logging in to the email service by means 
of username and password characters are applicable in the existing 
system. 
 Security type of authentication such as logging in to the email service 
using the secret code received to the mobile device of the user is also 
applicable. 
 This in turn less effectual since anybody who accesses the user’s mobile 
can log on to the service or there is no option in case of mobile theft. 
 Spam is a typical message passing that floods the Internet with many 
copies of the same message, in an attempt to force the message on 
people who would not otherwise choose to receive it. Spam keyword 
filtering is the way used in existing system to get rid of spam emails. 
 Frequent mails from a mail id can be spammed if it is tested against 
spam filter but the domain cannot be filtered under the spam filter. 
Hence any number of email id can be created by the spammers to send 
spam mail under the same domain.
System Requirements 
 Hardware Requirements: 
System : Pentium IV 2.4 GHz. 
Hard Disk : 80 GB. 
Floppy Drive : 1.44 Mb. 
Monitor : 15 VGA Colour. 
Mouse : Logitech. 
Ram : 1 GB or Above 
 Software Requirements: 
Operating system : Windows 7 
Front End : Dot net 4.0 (VS 2010) 
Backend : SQL Server 2008 R2
Architecture Diagram

More Related Content

More from KaashivInfoTech Company

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...KaashivInfoTech Company
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryOperational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryKaashivInfoTech Company
 
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestMining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestKaashivInfoTech Company
 
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationCoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationKaashivInfoTech Company
 
Data-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationData-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationKaashivInfoTech Company
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsKaashivInfoTech Company
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...KaashivInfoTech Company
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...KaashivInfoTech Company
 
Localization of License Plate Number Using Dynamic Image Processing Techniq...
Localization of License Plate Number Using Dynamic Image Processing   Techniq...Localization of License Plate Number Using Dynamic Image Processing   Techniq...
Localization of License Plate Number Using Dynamic Image Processing Techniq...KaashivInfoTech Company
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesKaashivInfoTech Company
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksKaashivInfoTech Company
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsKaashivInfoTech Company
 
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...KaashivInfoTech Company
 

More from KaashivInfoTech Company (14)

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithre...
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like ImageryOperational Data Fusion Framework for Building Frequent Land sat-Like Imagery
Operational Data Fusion Framework for Building Frequent Land sat-Like Imagery
 
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A DigestMining Gene Expression Data Focusing Cancer Therapeutics: A Digest
Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest
 
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report VisualizationCoDe Modeling of Graph Composition for Data Warehouse Report Visualization
CoDe Modeling of Graph Composition for Data Warehouse Report Visualization
 
Data-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware CharacterizationData-Centric OS Kernel Malware Characterization
Data-Centric OS Kernel Malware Characterization
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance frauds
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
 
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
An Interoperable System for Automated Diagnosis of Cardiac Abnormalities from...
 
Localization of License Plate Number Using Dynamic Image Processing Techniq...
Localization of License Plate Number Using Dynamic Image Processing   Techniq...Localization of License Plate Number Using Dynamic Image Processing   Techniq...
Localization of License Plate Number Using Dynamic Image Processing Techniq...
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
 
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback Sessions
 
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...Traffic Pattern-Based Content Leakage Detection for Trusted Content  Delivery...
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery...
 

Recently uploaded

Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)ayushiverma1100
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncrthapariya601
 
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...delhincr993
 
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)ayushiverma1100
 
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts ServiceBook Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Servicemonikaservice1
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Servicemonikaservice1
 
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)ayushiverma1100
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Servicemonikaservice1
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncrthapariya601
 
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...gitathapa4
 
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsLipikasharma29
 
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRCall Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRsafdarjungdelhi1
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsLipikasharma29
 
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhimonikaservice1
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Servicemonikaservice1
 
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts Service
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts ServiceCall Girls In New Delhi Railway Station 9667422720 Top Quality Escorts Service
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts ServiceLipikasharma29
 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts ServiceCALLGIRLS DELHI
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)thapagita
 
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts ServiceCall Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Servicemonikaservice1
 

Recently uploaded (20)

Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Karol Bagh (Delhi)
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
 
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...
9899855202 Call Girls In Goa This Ads Is Only For Those Clients Who Are Looki...
 
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Laxmi Nagar (Delhi)
 
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts ServiceBook Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
 
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Sarojini Nagar (Delhi)
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
 
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
Call Girls In saket 9711800081 Low Rate Short 1500 Night ...
 
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
 
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCRCall Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
Call Us ➥9911191017▻Young Call Girls In Guru Dronacharya Metro Station Delhi NCR
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
 
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
 
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts ServiceCall Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
Call Girls In Noida Sector 15 Metro꧁❤ 8800357707 ❤꧂Escorts Service
 
9953056974 Low Rate Call Girls Delhi NCR
9953056974 Low Rate Call Girls Delhi NCR9953056974 Low Rate Call Girls Delhi NCR
9953056974 Low Rate Call Girls Delhi NCR
 
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts Service
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts ServiceCall Girls In New Delhi Railway Station 9667422720 Top Quality Escorts Service
Call Girls In New Delhi Railway Station 9667422720 Top Quality Escorts Service
 
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts ServiceFULL ENJOY Call Girls In Gurgaon  Call 8588836666 Escorts Service
FULL ENJOY Call Girls In Gurgaon Call 8588836666 Escorts Service
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
 
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts ServiceCall Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
Call Girls In Sector 62, Noida꧁❤ 8800357707 ❤꧂Top Quality Escorts Service
 

Security evaluation of pattern classifiers under attack

  • 1. Based on the IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, NO. 99, may 2014 paper Security evaluation of pattern classifiers under attack
  • 2. Abstract  Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be purposely manipulated by humans to undermine their operation. As this adversarial scenario is not taken into account by classical design methods, pattern classification systems may exhibit vulnerabilities, whose exploitation may severely affect their performance, and consequently limit their practical utility. Extending pattern classification theory and design methods to adversarial settings is thus a novel and very relevant research direction, which has not yet been pursued  A systematic way. In this paper, we address one of the main open issues: evaluating at design phase the security of pattern classifiers, namely, the performance degradation under potential attacks they may incur during operation. We propose a framework for empirical evaluation of classifier security that formalizes and generalizes the main ideas proposed in the literature, and give examples of its use in three real applications. Reported results show that security evaluation can provide a more complete understanding of the classifier’s behavior in adversarial environments, and lead to better design choices
  • 3. Proposed System  In our proposed system, high effective authentication with the purpose of log on to the email service securely and efficient spamming are taken into consideration.  Authentication in the form of fractal detection and recognition after contour detection of the face using the image of the user is introduced.  Since fractal detection and recognition is a unique method to identify every human being, this concept is more effective in terms of authenticating into the service.  Pattern classifiers such as Keywords and URL’s for data check, tag construction and keyword identity, automatic readings of mails are the concepts used in this system.  Administrator of the email service uses the pattern classifiers and maintains a repository to filter out spam domains and keywords. Hence this perception spam’s the frequent surplus mails from same domain with different mail id.  Automatic reading of mails to examine the spammed keyword is an intriguing conception introduced in this system to overcome many flaws in case of spam filtering.
  • 4. Existing System  Message passing through emails is one the well-known way of today’s world since it is more effective and fast than any other sources.  Authentication is the major part often involves verifying the validity of at least one form of identifications of the users.  Normally authentications for logging in to the email service by means of username and password characters are applicable in the existing system.  Security type of authentication such as logging in to the email service using the secret code received to the mobile device of the user is also applicable.  This in turn less effectual since anybody who accesses the user’s mobile can log on to the service or there is no option in case of mobile theft.  Spam is a typical message passing that floods the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Spam keyword filtering is the way used in existing system to get rid of spam emails.  Frequent mails from a mail id can be spammed if it is tested against spam filter but the domain cannot be filtered under the spam filter. Hence any number of email id can be created by the spammers to send spam mail under the same domain.
  • 5. System Requirements  Hardware Requirements: System : Pentium IV 2.4 GHz. Hard Disk : 80 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 1 GB or Above  Software Requirements: Operating system : Windows 7 Front End : Dot net 4.0 (VS 2010) Backend : SQL Server 2008 R2