Intrusion detection systems vulnerability on adversarial examples.
Arkadiusz WarzynskiGrzegorz KolaczekPublished in: INISTA (2018)
Keyphrases
- intrusion detection system
- intrusion detection
- network security
- network traffic
- anomaly detection
- computer networks
- computer security
- network intrusion detection
- risk assessment
- alert correlation
- distributed intrusion detection
- cyber attacks
- cyber security
- computer systems
- database
- intrusion prevention
- social networks
- databases
- network attacks
- malicious activities
- training set
- normal behavior
- denial of service attacks
- attack scenarios
- network intrusions