Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors
暂无分享,去创建一个
Dongqi Han | Zhiliang Wang | Ying Zhong | Wenqi Chen | Jiahai Yang | Shuqiang Lu | Xingang Shi | Xia Yin | Dongqi Han | Zhiliang Wang | Ying Zhong | Wenqi Chen | Jiahai Yang | Shuqiang Lu | Xingang Shi | Xia Yin
[1] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[2] R. Eberhart,et al. Comparing inertia weights and constriction factors in particle swarm optimization , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[3] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[4] Kymie M. C. Tan,et al. Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.
[5] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[6] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[7] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[8] A. Qayyum,et al. Taxonomy of statistical based anomaly detection techniques for intrusion detection , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..
[9] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[10] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[11] Barry E. Mullins,et al. Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion , 2006, IEEE Security & Privacy.
[12] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[13] John C. Mitchell,et al. Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods , 2008, WOOT.
[14] A. Nur Zincir-Heywood,et al. Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[15] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[16] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[17] Malcolm I. Heywood,et al. Generating mimicry attacks using genetic programming: A benchmarking study , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[18] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[19] Geoffrey I. Webb,et al. Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.
[20] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[21] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[22] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[23] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[24] Yuan-Cheng Lai,et al. Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems , 2012, IEEE Communications Surveys & Tutorials.
[25] Fabio Roli,et al. Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues , 2013, Inf. Sci..
[26] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[27] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[28] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[29] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[30] Ali A. Ghorbani,et al. Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.
[31] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[33] Muhammad Sher,et al. Flow-based intrusion detection: Techniques and challenges , 2017, Comput. Secur..
[34] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[35] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[36] Robert C. Atkinson,et al. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey , 2017, ArXiv.
[37] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[38] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[39] Zhi Xue,et al. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection , 2018, PAKDD.
[40] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[41] Zheng Wang,et al. Deep Learning-Based Intrusion Detection With Adversaries , 2018, IEEE Access.
[42] Yuval Elovici,et al. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection , 2018, NDSS.
[43] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[44] Amit K. Roy-Chowdhury,et al. Adversarial Perturbations Against Real-Time Video Classification Systems , 2018, NDSS.
[45] Michele Colajanni,et al. Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors , 2019, 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA).
[46] Ting Wang,et al. TextBugger: Generating Adversarial Text Against Real-world Applications , 2018, NDSS.
[47] Eric Keller,et al. Towards Evaluation of NIDSs in Adversarial Setting , 2019, Big-DAMA@CoNEXT.
[48] Weiqing Huang,et al. Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method , 2019, 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI).
[49] Martín Ochoa,et al. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach , 2018, EAI Endorsed Trans. Security Safety.
[50] M. Omair Shafiq,et al. Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[51] D. Siracusa,et al. Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection , 2020, IEEE Transactions on Network and Service Management.
[52] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[53] Meng Zhang,et al. Textual Adversarial Attack as Combinatorial Optimization , 2019, 1910.12196.
[54] Sai Sree Laya Chukkapalli,et al. NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion , 2020, 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
[55] Parth Sagar,et al. A Survey on Intrusion Detection System Using Machine Learning Algorithms , 2020 .
[56] Yizheng Chen,et al. On Training Robust PDF Malware Classifiers , 2019, USENIX Security Symposium.
[57] Yuhang Zhao,et al. An adversarial attack on DNN-based black-box object detectors , 2020, J. Netw. Comput. Appl..
[58] Xin Du,et al. A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework , 2020, IEEE Transactions on Information Forensics and Security.
[59] Ying Zhong,et al. HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning , 2020, Comput. Networks.
[60] Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems , 2019, 2021 IEEE Symposium on Security and Privacy (SP).
[61] Hongxin Hu,et al. Rallying Adversarial Techniques against Deep Learning for Network Security , 2019, 2021 IEEE Symposium Series on Computational Intelligence (SSCI).