Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …
that solve problems and enable automation in diverse domains. Primarily, this is due to the …
Wild patterns: Ten years after the rise of adversarial machine learning
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …
applications, ranging from computer vision to computer security. In most of these …
Fine-pruning: Defending against backdooring attacks on deep neural networks
Deep neural networks (DNNs) provide excellent performance across a wide range of
classification tasks, but their training requires high computational resources and is often …
classification tasks, but their training requires high computational resources and is often …
Evasion attacks against machine learning at test time
In security-sensitive applications, the success of machine learning depends on a thorough
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
vetting of their resistance to adversarial data. In one pertinent, well-motivated attack …
Insomnia: Towards concept-drift robustness in network intrusion detection
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
intelligence, network intrusion detection systems based on machine learning (ML) have yet …
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …
Security evaluation of pattern classifiers under attack
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …
authentication, network intrusion detection, and spam filtering, in which data can be …
Practical evasion of a learning-based classifier: A case study
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …
data. However, if they are deployed online, an attacker may attempt to evade them by …
Toward supervised anomaly detection
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …
from adversarial or unlikely events with unknown distributions. However, the predictive …