Polymorphic Adversarial DDoS attack on IDS using GAN

R Chauhan, SS Heydari - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Intrusion Detection systems are important tools in preventing malicious traffic from
penetrating into networks and systems. Recently, Intrusion Detection Systems are rapidly …

Robust online learning against malicious manipulation and feedback delay with application to network flow classification

Y Li, B Liang, A Tizghadam - IEEE Journal on Selected Areas …, 2021 - ieeexplore.ieee.org
Malicious data manipulation reduces the effectiveness of machine learning techniques,
which rely on accurate knowledge of the input data. Motivated by real-world applications in …

Polymorphic adversarial cyberattacks using WGAN

R Chauhan, U Sabeel, A Izaddoost… - Journal of Cybersecurity …, 2021 - mdpi.com
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic
from penetrating networks and systems. Recently, these systems have been enhancing their …

Robust Decentralized Online Learning against Malicious Data Generators and Dynamic Feedback Delays with Application to Traffic Classification

Y Li, D Wen, M Xia - 2023 20th Annual IEEE International …, 2023 - ieeexplore.ieee.org
Motivated by the real-world application of traffic classification at the network edge, we study
the problem of robust decentralized online learning against malicious data generators that …

Robust online learning against malicious manipulation with application to network flow classification

Y Li, B Liang, A Tizghadam - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Malicious data manipulation reduces the effectiveness of machine learning techniques,
which rely on accurate knowledge of the input data. Motivated by real-world applications in …

Lowcaf: A Low-Code Protocol Analysis Framework

A Frank, M Steinke, W Hommel - 2024 20th International …, 2024 - ieeexplore.ieee.org
Evaluating a communication protocol's design in terms of compliance and security is a very
complex and time-consuming task. It requires the configuration of suitable test environments …

A model‐driven approach for experimental evaluation of intrusion detection systems

A Abou El Kalam, M Gad El Rab… - Security and …, 2014 - Wiley Online Library
Because attacks are becoming more frequent and more complex, intrusion detection
systems (IDSes) need significant improvements to be able to detect new attacks and variants …

於網路測試平台合成真實網路測試流量之探討與實現

洪啟展 - 中原大學通訊工程碩士學位學程學位論文, 2024 - airitilibrary.com
網路流量一直是許多研究人員關注的課題, 機器學習的出現更能夠幫助網路管理者快速感知和
抵禦網路流量攻擊. 由於可以作為測試用的真實網路環境下出現之異常流量相當稀缺且難以取得 …

Estimating the Memory Consumption of a Hardware IP Defragmentation Block

M Czekaj, E Jamro, K Wiatr - Electronics, 2021 - mdpi.com
IP fragmentation is still prevalent on the Internet. Defragmented traffic is a prerequisite for
many network processing algorithms. This work focuses on the size and organization of a …

[引用][C] 基于神经网络的网络安全态势感知

谢丽霞, 王亚超, 于巾博 - 清华大学学报: 自然科学版, 2013