作者
Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac
发表日期
2019/8/26
研讨会论文
Proceedings of the 14th International Conference on Availability, Reliability and Security
页码范围
21
出版商
ACM
简介
The process of identifying the true anomalies from a given set of data instances is known as anomaly detection. It has been applied to address a diverse set of problems in multiple application domains including cybersecurity. Deep learning has recently demonstrated state-of-the-art performance on key anomaly detection applications, such as intrusion detection, Denial of Service (DoS) attack detection, security log analysis, and malware detection. Despite the great successes achieved by neural network architectures, models with very low test error have been shown to be consistently vulnerable to small, adversarially chosen perturbations of the input. The existence of evasion attacks during the test phase of machine learning algorithms represents a significant challenge to both their deployment and understanding.
Recent approaches in the literature have focused on three different areas: (a) generating adversarial …
引用总数
2020202120222023202441622152
学术搜索中的文章
A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac - Proceedings of the 14th international conference on …, 2019