John et al., 2019 - Google Patents
Adversarial attacks and defenses in malware detection classifiersJohn et al., 2019
- Document ID
- 5856552920565956936
- Author
- John T
- Thomas T
- Publication year
- Publication venue
- Handbook of research on cloud computing and big data applications in IoT
External Links
Snippet
Abstract Machine learning has found its immense application in various cybersecurity domains owing to its automated threat prediction and detection capabilities. Despite its advantages, attackers can utilize the vulnerabilities of machine learning models for …
- 238000001514 detection method 0 title abstract description 109
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vinayakumar et al. | A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): deep learning for N-IDSs | |
Aldwairi et al. | Detection of drive-by download attacks using machine learning approach | |
Sahu et al. | An SVM-based ensemble approach for intrusion detection | |
John et al. | Adversarial attacks and defenses in malware detection classifiers | |
Kumari et al. | Cross-layer based intrusion detection and prevention for network | |
Yadav et al. | A survey on network intrusion detection using deep generative networks for cyber-physical systems | |
Sellappan et al. | Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system | |
Menaouer et al. | Android malware detection approach using stacked autoencoder and convolutional neural networks | |
Vishnoi et al. | Android malware detection techniques in traditional and cloud computing platforms: a state-of-the-art survey | |
Preethi et al. | EFS-LSTM (ensemble-based feature selection with LSTM) classifier for intrusion detection system | |
Al Obaidan et al. | Digital transformation and cybersecurity challenges: A study of malware detection using machine learning techniques | |
Bagui et al. | Classifying UNSW-NB15 network traffic in the Big Data Framework using random forest in Spark | |
Yaokumah et al. | Machine learning methods for detecting Internet-of-Things (IoT) malware | |
Khan et al. | Multifractal singularity spectrum for cognitive cyber defence in internet time series | |
Ponnusamy et al. | A review of attacks and countermeasures in internet of things and cyber physical systems | |
Sandeep et al. | Anomaly intrusion detection using svm and c4. 5 classification with an improved particle swarm optimization (I-PSO) | |
Sallah et al. | Machine learning interpretability to detect fake accounts in Instagram | |
Balaji et al. | Malware analysis using classification and clustering algorithms | |
Machaka et al. | Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey | |
Clottey et al. | Modelling and evaluation of network intrusion detection systems using machine learning techniques | |
BP et al. | An approach for semi-supervised machine learning-based mobile network anomaly detection with tagging | |
Vidal et al. | Anomaly-based intrusion detection: adapting to present and forthcoming communication environments | |
Ibrahim et al. | An adaptive intrusion detection scheme for cloud computing | |
Korba et al. | Hybrid intrusion detection framework for Ad hoc networks | |
Ganesan et al. | A Survey of Data Mining and Machine Learning-Based Intrusion Detection System for Cyber Security |