DOI: 10.1007/978-3-540-87403-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Evading Anomaly Detection through Variance Injection Attacks on PCA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…In this study, we used oil pump frequency data to exclude false anomalies in the pressure data. Since variance can reflect the degree of data deviation from the mean value, the variance of the oil pump frequency value in the time period when abnormal events occur is used as the basis for determining false anomalies [50,51]. When the variance is 0, the abnormality has nothing to do with the adjustment of the oil pump frequency; when the variance is not 0, the anomaly is a false anomaly caused by the adjustment of the oil pump frequency.…”
Section: Joint Analysis Anomaly Identification Methodmentioning
confidence: 99%
“…In this study, we used oil pump frequency data to exclude false anomalies in the pressure data. Since variance can reflect the degree of data deviation from the mean value, the variance of the oil pump frequency value in the time period when abnormal events occur is used as the basis for determining false anomalies [50,51]. When the variance is 0, the abnormality has nothing to do with the adjustment of the oil pump frequency; when the variance is not 0, the anomaly is a false anomaly caused by the adjustment of the oil pump frequency.…”
Section: Joint Analysis Anomaly Identification Methodmentioning
confidence: 99%
“…We decided to use a trust-based approach for evaluating the aggregation agents, because it not only eliminates the noise in the background traffic and randomness of the challenge selection process, but accounts for the fact that attackers might try to manipulate the system by inserting misleading traffic flows. An attacker could insert fabricated flows [13] hoping they would cause the system to select an aggregation agent that is less sensitive to the threat the attacker actually intends to realize. When using trust, one tries to avoid this manipulation by dynamically adapting to more recent actions of an attacker.…”
Section: Dynamic Aggregation Agent Selectionmentioning
confidence: 99%
“…detection performance) values close to the optimum, and has to operate in a manner which would evade any of these profiles. This unpredictability, together with the additional robustness achieved by the use of multiple algorithms, makes the IDS evasion a much more difficult task than simply avoiding a single intrusion detection method [13].…”
Section: Ids Monitoring Architecturementioning
confidence: 99%
“…Consequently, anomaly detection has received a lot of attention in the last decade, and numerous detectors have been proposed. Operators, however, often disregard the alarms reported by anomaly detectors because of several drawbacks discrediting them [10,21,23,24]. The key task for improving anomaly detectors is to thoroughly evaluate their output.…”
Section: Introductionmentioning
confidence: 99%