Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.

IEEE Transactions on Dependable and Secure Computing(2015)

引用 43|浏览111
暂无评分
摘要
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to deception, notably in the form of attacks carefully constructed to evade detection. Various learning schemes have been proposed to overcome this w...
更多
查看译文
关键词
Payloads,Training,Computational modeling,Intrusion detection,Machine learning algorithms,Feature extraction
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要