Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Shawn ShanPublished in: MTD@CCS (2021)
Keyphrases
- neural network
- network intrusion
- detecting malicious
- countermeasures
- artificial neural networks
- neural network model
- pattern recognition
- fuzzy logic
- multi layer
- back propagation
- forensic analysis
- traffic analysis
- multilayer perceptron
- computer security
- fuzzy systems
- neural nets
- fault diagnosis
- genetic algorithm
- network intrusion detection
- multi layer perceptron
- recurrent neural networks
- feed forward
- radial basis function
- activation function
- security threats
- watermarking scheme
- malicious attacks
- terrorist attacks
- malicious users