Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samples

[1]  Farrukh Aslam Khan,et al.  A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection , 2018, Cluster Computing.

[2]  Donato Malerba,et al.  Clustering-Aided Multi-View Classification: A Case Study on Android Malware Detection , 2020, Journal of Intelligent Information Systems.

[3]  J. C. Dunn,et al.  A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .

[4]  Kaushik Roy,et al.  LSTM for Anomaly-Based Network Intrusion Detection , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).

[5]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[6]  Sattar Hashemi,et al.  Discovering Future Malware Variants By Generating New Malware Samples Using Generative Adversarial Network , 2019, 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE).

[7]  Sanjay Chawla,et al.  Adversarial Attack, Defense, and Applications with Deep Learning Frameworks , 2019 .

[8]  Donato Malerba,et al.  Dealing with Class Imbalance in Android Malware Detection by Cascading Clustering and Classification , 2020, Complex Pattern Mining.

[9]  Feng Jiang,et al.  Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.

[10]  Daniel S. Berman,et al.  A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..

[11]  Fei Wang,et al.  Sparse Feature Attacks in Adversarial Learning , 2014, IEEE Transactions on Knowledge and Data Engineering.

[12]  Xu Chen,et al.  Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.

[13]  Divya Bansal,et al.  Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).

[14]  Djamal Zeghlache,et al.  A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[15]  John Platt,et al.  Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .

[16]  K. Sundarakantham,et al.  Machine Learning Based Intrusion Detection System , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[17]  Akbar Siami Namin,et al.  Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[18]  K. P. Soman,et al.  Robust Intelligent Malware Detection Using Deep Learning , 2019, IEEE Access.

[19]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[20]  William A. Gale,et al.  A sequential algorithm for training text classifiers , 1994, SIGIR '94.

[21]  Ming Zhu,et al.  Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).

[22]  T.C.E. Cheng,et al.  Scheduling with Time-Dependent Processing Times 2015 , 2014 .

[23]  Jinping Liu,et al.  Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection , 2020, Expert Syst. Appl..

[24]  Lizhi Peng,et al.  A Signature-Based Assistant Random Oversampling Method for Malware Detection , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[25]  Panayiotis Kotzanikolaou,et al.  Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things , 2019, Security and Privacy Trends in the Industrial Internet of Thing.

[26]  Corrado Loglisci,et al.  Multi-Channel Deep Feature Learning for Intrusion Detection , 2020, IEEE Access.

[27]  David M. W. Powers,et al.  Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.

[28]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[29]  Lei Liu,et al.  Combining supervised and unsupervised learning for zero-day malware detection , 2013, 2013 Proceedings IEEE INFOCOM.

[30]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[31]  Donato Malerba,et al.  A novel spectral-spatial co-training algorithm for the transductive classification of hyperspectral imagery data , 2017, Pattern Recognit..

[32]  Miad Faezipour,et al.  Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.

[33]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[34]  Mark Stamp,et al.  Detecting malware evolution using support vector machines , 2020, Expert Syst. Appl..

[35]  Liang Liu,et al.  A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework , 2019, IEEE Access.

[36]  Abdelouahid Derhab,et al.  Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..

[37]  Michelangelo Ceci,et al.  A relational approach to probabilistic classification in a transductive setting , 2009, Eng. Appl. Artif. Intell..

[38]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[39]  Zhisheng Hu,et al.  Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks , 2019, Adversarial and Uncertain Reasoning for Adaptive Cyber Defense.

[40]  Lei Shi,et al.  MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.

[41]  Prabaharan Poornachandran,et al.  Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[42]  Yu Lasheng,et al.  Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.

[43]  Wenbo Guo,et al.  Adversary Resistant Deep Neural Networks with an Application to Malware Detection , 2016, KDD.

[44]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[45]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[46]  Julio Gonzalo,et al.  A comparison of extrinsic clustering evaluation metrics based on formal constraints , 2008, Information Retrieval.

[47]  Anuradha Pillai,et al.  Applications of Machine Learning in Cyber Security , 2020, Handbook of Research on Machine and Deep Learning Applications for Cyber Security.

[48]  Julian Jang,et al.  A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..

[49]  Corrado Loglisci,et al.  Exploiting the Auto-Encoder Residual Error for Intrusion Detection , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[50]  Sung-Bae Cho,et al.  Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders , 2018, Inf. Sci..

[51]  Jinoh Kim,et al.  An Encoding Technique for CNN-based Network Anomaly Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[52]  André C. Drummond,et al.  Adaptive anomaly‐based intrusion detection system using genetic algorithm and profiling , 2018, Secur. Priv..

[53]  Rytis Maskeliunas,et al.  Serious Game iDO: Towards Better Education in Dementia Care , 2019, Inf..

[54]  Tao Feng,et al.  Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection , 2019, IEEE Access.

[55]  Wei Liu,et al.  A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection , 2020, Applied Sciences.

[56]  Lei Zhang,et al.  A Structural SVM Based Approach for Binary Classification under Class Imbalance , 2015 .

[57]  Pirooz Shamsinejad,et al.  Intrusion Detection using a Novel Hybrid Method Incorporating an Improved KNN , 2017 .

[58]  Ali A. Ghorbani,et al.  Towards a Network-Based Framework for Android Malware Detection and Characterization , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[59]  Jinlin Wang,et al.  Variant Gated Recurrent Units With Encoders to Preprocess Packets for Payload-Aware Intrusion Detection , 2019, IEEE Access.

[60]  Christian Igel,et al.  Active learning with support vector machines , 2014, WIREs Data Mining Knowl. Discov..

[61]  Thi-Thu-Huong Le,et al.  The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).

[62]  Xiaosong Zhang,et al.  An Improved Convolutional Neural Network Model for Intrusion Detection in Networks , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[63]  Peisheng Pan,et al.  A Hybrid Intrusion Detection Method Based on Improved Fuzzy C-Means and Support Vector Machine , 2019, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE).

[64]  Ananthram Swami,et al.  Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[65]  S. Krishnaveni,et al.  Anomaly-Based Intrusion Detection System Using Support Vector Machine , 2020, Advances in Intelligent Systems and Computing.

[66]  George Karabatis,et al.  SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks , 2019, OTM Workshops.

[67]  Yuan Fei,et al.  The SVM based on SMO optimization for Speech Emotion Recognition , 2019, 2019 Chinese Control Conference (CCC).

[68]  Donato Malerba,et al.  Segmentation-aided classification of hyperspectral data using spatial dependency of spectral bands , 2019, ISPRS Journal of Photogrammetry and Remote Sensing.

[69]  Chuan Sheng Foo,et al.  Adversarially Learned Anomaly Detection , 2018, 2018 IEEE International Conference on Data Mining (ICDM).

[70]  Patrick D. McDaniel,et al.  Making machine learning robust against adversarial inputs , 2018, Commun. ACM.

[71]  Wang Qing,et al.  Speech Analysis for Wilson’s Disease Using Genetic Algorithm and Support Vector Machine , 2019 .

[72]  Edward Y. Chang,et al.  SVM binary classifier ensembles for image classification , 2001, CIKM '01.

[73]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[74]  Georg Langs,et al.  Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.

[75]  Michal Szczepanik,et al.  Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code , 2019, International Journal of Network Security & Its Applications.

[76]  Sung-Bae Cho,et al.  Detecting Intrusive Malware with a Hybrid Generative Deep Learning Model , 2018, IDEAL.

[77]  Jack W. Stokes,et al.  Detection of Prevalent Malware Families with Deep Learning , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).

[78]  Chuan Sheng Foo,et al.  Efficient GAN-Based Anomaly Detection , 2018, ArXiv.