2019
DOI: 10.4108/eai.10-1-2019.156245
|View full text |Cite
|
Sign up to set email alerts
|

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

Abstract: Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protection system can easily bypass the detection module. The main objective of our work is to improve the performance capabilities of intrusion detection classifiers against such adversaries. To this end, we firstly propose several obfuscation techniques of remote attacks t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
54
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(54 citation statements)
references
References 21 publications
0
54
0
Order By: Relevance
“…A data sample of the dataset D tr refers to the vector of the network connection features, defined in Section II-B. Then, referring to [22] and [23], let X = V × Y be the space of labeled samples, where V represents the space of unlabeled samples and Y represents the space of possible labels. Let D tr = {x 1 , x 2 , .…”
Section: Intrusion Detection Classification Taskmentioning
confidence: 99%
See 2 more Smart Citations
“…A data sample of the dataset D tr refers to the vector of the network connection features, defined in Section II-B. Then, referring to [22] and [23], let X = V × Y be the space of labeled samples, where V represents the space of unlabeled samples and Y represents the space of possible labels. Let D tr = {x 1 , x 2 , .…”
Section: Intrusion Detection Classification Taskmentioning
confidence: 99%
“…For more experiments with this dataset, including trinominal and multi-nominal labels, detection of unknown obfuscations by a custom leave-one-out validation, and individual feature analysis, we refer the reader to [23] and [14].…”
Section: Asnm-npbo Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…is the urgency to filter and reduce false alarms [7] developed to make better learning and processing for big data and a variety of attacks for future prediction. We overview deep neural networks in the following section.…”
Section: Thesis Organizationmentioning
confidence: 99%
“…[3] [7] [8] confirm that there are different growing types and methods of attacks that donates a severe challenge on vulnerabilities of DNN architecture design. The fact that the training of DNNs is based on data, classification tasks can be carefully manipulated by crafted perturbations called adversarial samples.…”
mentioning
confidence: 99%