Towards evaluation of nidss in adversarial setting

MJ Hashemi, G Cusack, E Keller - Proceedings of the 3rd ACM CoNEXT …, 2019 - dl.acm.org
Signature-based Network Intrusion Detection Systems (NIDSs) have traditionally been used
to detect malicious traffic, but they are incapable of detecting new threats. As a result …

[PDF][PDF] Towards Evaluation of NIDSs in Adversarial Setting

MJ Hashemi, G Cusack, E Keller - 2019 - gregcusack.github.io
The impacts of these attacks range from high monetary costs for exploited businesses and
individuals, to more serious issues, such as wide-scale power outages [14]. Due to the …

[PDF][PDF] Towards Evaluation of NIDSs in Adversarial Setting

M Hashemi, G Cusack - 3rd ACM CoNEXT Workshop on Big DAta …, 2019 - par.nsf.gov
Network attacks continue to grow in complexity, scale, and number [24]. The impacts of
these attacks range from high monetary costs for exploited businesses and individuals, to …

[PDF][PDF] Towards Evaluation of NIDSs in Adversarial Setting

MJ Hashemi, G Cusack, E Keller - 2019 - eric-keller.github.io
Network attacks continue to grow in complexity, scale, and number [24]. The impacts of
these attacks range from high monetary costs for exploited businesses and individuals, to …