{"title":"用于减轻特征驱动攻击的可解释机器学习","authors":"Corey M. Hartman;Bhaskar P. Rimal","doi":"10.1109/TTS.2025.3531780","DOIUrl":null,"url":null,"abstract":"Recent studies have found that 43% of malware infections begin as malicious Microsoft Office documents in the form of Word or Excel file. While many techniques are proposed and are effective in the detection of malicious documents through the utilization of machine learning (ML) algorithms, bias in the datasets and the lack of insight into the decision as to why a document was flagged as malicious are problematic, as one key feature focused on by the ML model utilized may be relied on solely for the prediction that is made. By utilizing the SHAP algorithm (SHapley Additive exPlanation) and an ensemble of ML algorithms split into groups by their SHAP magnitude, where those features taking over the decision-making process of a model are split into their own feature set and are utilized in the training of a separate ML model, a voting classifier can be made to reduce this bias and reliance on a single or select few features. That allows for a more robust ML model for predicting malicious Office documents and presenting more insight into why a prediction was made by the classifier and a model that can let the user know when not enough data is present to predict with confidence. By utilizing this technique, an ensemble soft voting classifier was created that obtained 90.1% accuracy on a balanced dataset consisting of 250 malicious and 250 benign randomly selected Office documents and presents the user with a simple natural language statement that indicates the classification of the documents and why it was classified as a specific label.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 2","pages":"220-230"},"PeriodicalIF":0.0000,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Interpretable Machine Learning for Mitigating Feature-Driven Attacks\",\"authors\":\"Corey M. Hartman;Bhaskar P. Rimal\",\"doi\":\"10.1109/TTS.2025.3531780\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent studies have found that 43% of malware infections begin as malicious Microsoft Office documents in the form of Word or Excel file. While many techniques are proposed and are effective in the detection of malicious documents through the utilization of machine learning (ML) algorithms, bias in the datasets and the lack of insight into the decision as to why a document was flagged as malicious are problematic, as one key feature focused on by the ML model utilized may be relied on solely for the prediction that is made. By utilizing the SHAP algorithm (SHapley Additive exPlanation) and an ensemble of ML algorithms split into groups by their SHAP magnitude, where those features taking over the decision-making process of a model are split into their own feature set and are utilized in the training of a separate ML model, a voting classifier can be made to reduce this bias and reliance on a single or select few features. That allows for a more robust ML model for predicting malicious Office documents and presenting more insight into why a prediction was made by the classifier and a model that can let the user know when not enough data is present to predict with confidence. By utilizing this technique, an ensemble soft voting classifier was created that obtained 90.1% accuracy on a balanced dataset consisting of 250 malicious and 250 benign randomly selected Office documents and presents the user with a simple natural language statement that indicates the classification of the documents and why it was classified as a specific label.\",\"PeriodicalId\":73324,\"journal\":{\"name\":\"IEEE transactions on technology and society\",\"volume\":\"6 2\",\"pages\":\"220-230\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2025-02-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE transactions on technology and society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10869832/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE transactions on technology and society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10869832/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Interpretable Machine Learning for Mitigating Feature-Driven Attacks
Recent studies have found that 43% of malware infections begin as malicious Microsoft Office documents in the form of Word or Excel file. While many techniques are proposed and are effective in the detection of malicious documents through the utilization of machine learning (ML) algorithms, bias in the datasets and the lack of insight into the decision as to why a document was flagged as malicious are problematic, as one key feature focused on by the ML model utilized may be relied on solely for the prediction that is made. By utilizing the SHAP algorithm (SHapley Additive exPlanation) and an ensemble of ML algorithms split into groups by their SHAP magnitude, where those features taking over the decision-making process of a model are split into their own feature set and are utilized in the training of a separate ML model, a voting classifier can be made to reduce this bias and reliance on a single or select few features. That allows for a more robust ML model for predicting malicious Office documents and presenting more insight into why a prediction was made by the classifier and a model that can let the user know when not enough data is present to predict with confidence. By utilizing this technique, an ensemble soft voting classifier was created that obtained 90.1% accuracy on a balanced dataset consisting of 250 malicious and 250 benign randomly selected Office documents and presents the user with a simple natural language statement that indicates the classification of the documents and why it was classified as a specific label.