Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
A survey of distance and similarity measures used within network intrusion anomaly detection
DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …
Practical evasion of a learning-based classifier: A case study
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …
data. However, if they are deployed online, an attacker may attempt to evade them by …
Toward supervised anomaly detection
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …
from adversarial or unlikely events with unknown distributions. However, the predictive …
Online anomaly detection under adversarial impact
Security analysis of learning algorithms is gaining increasing importance, especially since
they have become target of deliberate obstruction in certain applications. Some security …
they have become target of deliberate obstruction in certain applications. Some security …
[LIBRO][B] Adversarial machine learning
AD Joseph, B Nelson, BIP Rubinstein, JD Tygar - 2018 - books.google.com
Written by leading researchers, this complete introduction brings together all the theory and
tools needed for building robust machine learning in adversarial environments. Discover …
tools needed for building robust machine learning in adversarial environments. Discover …
A learning-based framework for engineering feature-oriented self-adaptive software systems
Self-adaptive software systems are capable of adjusting their behavior at runtime to achieve
certain functional or quality-of-service goals. Often a representation that reflects the internal …
certain functional or quality-of-service goals. Often a representation that reflects the internal …
Repids: A multi tier real-time payload-based intrusion detection system
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large
feature set to discriminate normal pattern and intrusive pattern. However, most of existing …
feature set to discriminate normal pattern and intrusive pattern. However, most of existing …
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
We review and evaluate three techniques that allow a passive adversary to track users who
have dynamic IP addresses based on characteristic behavioral patterns, ie, without cookies …
have dynamic IP addresses based on characteristic behavioral patterns, ie, without cookies …
[PDF][PDF] ENCOPLOT: Pairwise sequence matching in linear time applied to plagiarism detection
ENCOPLOT: Pairwise Sequence Matching in Linear Time Applied to Plagiarism Detection Page
1 Network Security Plagiarism Encoplot ENCOPLOT: Pairwise Sequence Matching in Linear …
1 Network Security Plagiarism Encoplot ENCOPLOT: Pairwise Sequence Matching in Linear …