2012
DOI: 10.1007/978-3-642-31540-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Reconstruction Attack through Classifier Analysis

Abstract: In this paper, we introduce a novel inference attack that we coin as the reconstruction attack whose objective is to reconstruct a probabilistic version of the original dataset on which a classifier was learnt from the description of this classifier and possibly some auxiliary information. In a nutshell, the reconstruction attack exploits the structure of the classifier in order to derive a probabilistic version of dataset on which this model has been trained. Moreover, we propose a general framework that can … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…This is done iteratively by sampling data points and using membership inference attacks to reconstruct the training data used by the target Neural Network. In data reconstruction attack, an adversary uses a generative adversarial network to reconstruct training data samples from target model by finding the approximate training data distribution [30] [10]. Either of the two approaches can be used to reconstruct the dataset and it is a one time operation done during the setup phase of the attack as described in Section VI.…”
Section: Threat Modelmentioning
confidence: 99%
“…This is done iteratively by sampling data points and using membership inference attacks to reconstruct the training data used by the target Neural Network. In data reconstruction attack, an adversary uses a generative adversarial network to reconstruct training data samples from target model by finding the approximate training data distribution [30] [10]. Either of the two approaches can be used to reconstruct the dataset and it is a one time operation done during the setup phase of the attack as described in Section VI.…”
Section: Threat Modelmentioning
confidence: 99%
“…Interpretable models enhance transparency but can inadvertently disclose information about their training data. Gambs et al [56] uses such data leakage to probabilistically reconstruct a decision tree's training set. The uncertainty within this reconstruction can be measured to determine how much information the model leaks.…”
Section: Causes Of Reconstruction Attacksmentioning
confidence: 99%
“…If a value D 𝑖,𝑘 within 𝑉 𝑘 has all the probability mass (i.e., 𝑃 (D 𝑖,𝑘 = 𝑣 𝑖,𝑘 ) = 1), it's deterministic. Conversely, a probabilistic dataset encompasses some uncertainty about attribute values.• Probabilistic Reconstruction Attacks: Earlier research[56] proposes a method for constructing a probabilistic dataset D 𝐷𝑇 from the structure of a trained decision tree 𝐷𝑇 . This probabilistic dataset reflects the decision tree's implicit knowledge about its training dataset D 𝑂𝑟𝑖𝑔 .…”
mentioning
confidence: 99%
“…As shown in the work of Hamlen et al, 18 an IDS decision tree can be recovered this way by exploiting public interfaces of an IDS and building the decision tree by feeding it with many samples and examining their classifications. Reconstruction attacks such as the one described in the previous work 28 for a C4.5 decision tree could also be used for this purpose.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…As shown in the work of Hamlen et al, an IDS decision tree can be recovered this way by exploiting public interfaces of an IDS and building the decision tree by feeding it with many samples and examining their classifications. Reconstruction attacks such as the one described in the previous work for a C4.5 decision tree could also be used for this purpose. This assumption that the IDS classifier can be reconstructed is common in several papers on this subject (eg, in the literature), as well as in cryptography (Kerckhoffs's principle).…”
Section: Problem Descriptionmentioning
confidence: 99%