Detection of Iterative Adversarial Attacks via Counter Attack.
Matthias RottmannMathis PeyronNatasa KrejicHanno GottschalkPublished in: CoRR (2020)
Keyphrases
- attack detection
- network attacks
- normal traffic
- countermeasures
- distributed denial of service attacks
- malicious attacks
- malicious users
- intrusion detection
- attack scenarios
- intrusion detection system
- denial of service attacks
- detecting malicious
- dos attacks
- misuse detection
- ddos attacks
- network intrusions
- differential power analysis
- cyber attacks
- normal behavior
- detection algorithm
- block cipher
- network intrusion detection
- false alarms
- network traffic
- detection method
- detect malicious
- security risks
- fault injection
- security threats
- detection rate
- anomaly detection
- information leakage
- power analysis
- object detection
- false positives