Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

Toward supervised anomaly detection

N Görnitz, M Kloft, K Rieck, U Brefeld - Journal of Artificial Intelligence …, 2013 - jair.org
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …

Online anomaly detection under adversarial impact

M Kloft, P Laskov - Proceedings of the thirteenth …, 2010 - proceedings.mlr.press
Security analysis of learning algorithms is gaining increasing importance, especially since
they have become target of deliberate obstruction in certain applications. Some security …

[LIBRO][B] Adversarial machine learning

AD Joseph, B Nelson, BIP Rubinstein, JD Tygar - 2018 - books.google.com
Written by leading researchers, this complete introduction brings together all the theory and
tools needed for building robust machine learning in adversarial environments. Discover …

A learning-based framework for engineering feature-oriented self-adaptive software systems

N Esfahani, A Elkhodary, S Malek - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Self-adaptive software systems are capable of adjusting their behavior at runtime to achieve
certain functional or quality-of-service goals. Often a representation that reflects the internal …

Repids: A multi tier real-time payload-based intrusion detection system

A Jamdagni, Z Tan, X He, P Nanda, RP Liu - Computer networks, 2013 - Elsevier
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large
feature set to discriminate normal pattern and intrusive pattern. However, most of existing …

Behavior-based tracking: Exploiting characteristic patterns in DNS traffic

D Herrmann, C Banse, H Federrath - Computers & Security, 2013 - Elsevier
We review and evaluate three techniques that allow a passive adversary to track users who
have dynamic IP addresses based on characteristic behavioral patterns, ie, without cookies …

[PDF][PDF] ENCOPLOT: Pairwise sequence matching in linear time applied to plagiarism detection

C Grozea, C Gehl, M Popescu - 3rd PAN Workshop …, 2009 - pdfs.semanticscholar.org
ENCOPLOT: Pairwise Sequence Matching in Linear Time Applied to Plagiarism Detection Page
1 Network Security Plagiarism Encoplot ENCOPLOT: Pairwise Sequence Matching in Linear …