Description
Machine learning techniques are often used for decision making in security critical applications such as intrusion detection and spam filtering. However, much of the security analysis surrounding learning algorithms is theoretical. This thesis provides a practical evaluation of the algorithms used by SpamBayes, a statistical spam filter, to determine its ability to correctly distinguish spam email for normal email when learning in the presence of an adversary.
This thesis presents both attacks against SpamBayes and defenses against these attacks. The attacks are able to subvert the spam filter by both causing a high percentage of false positives and false negatives. With only a 100 attack emails, out of an initial training corpus of 10,000, the spam filter's performance is sufficiently degraded to either cause a denial of service attack or successfully allow spam emails to bypass the filter. The defenses shown in this thesis are able to work against the attacks developed against SpamBayes and are sufficiently generic to be easily extended into other statistical machine learning algorithms.