CPC H04L 63/1416 (2013.01) [G06N 3/04 (2013.01); H04L 63/1425 (2013.01); H04L 63/1491 (2013.01)] | 20 Claims |
1. A method performed by a protection node for protecting a pattern classification node from malicious requests, the method comprising:
receiving, from a user node a request containing an original pattern to be classified by a machine learning algorithm performed by the pattern classification node;
adding noise to the original pattern to generate a noisy pattern;
obtaining a first classification of the noisy pattern based on processing of the noisy pattern by a first clone of the machine learning algorithm performed by the protection node;
obtaining a second classification of the original pattern based on forwarding the request for processing of the original pattern by the machine learning algorithm performed by the pattern classification node;
comparing the first and second classifications to determine whether the first and second classifications satisfy a defined similarity rule; and
using the comparison to manage the request from the user node.
|