Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation.
Hassan ChaitouThomas RobertJean LeneutreLaurent PautetPublished in: ICSBT/SECRYPT (Revised Selected Papers) (2022)
Keyphrases
- intrusion detection system
- malicious activities
- malicious users
- detect malicious
- normal traffic
- malicious attacks
- detecting malicious
- insider attacks
- malicious behavior
- intrusion detection
- attack detection
- malicious code
- anomaly detection
- network traffic
- network security
- insider threat
- semi fragile watermarking
- denial of service attacks
- network intrusion detection
- malicious nodes
- countermeasures
- malicious traffic
- computer networks
- multi agent
- normal behavior
- risk management
- security threats
- computer security
- detection mechanism
- traffic patterns
- cyber attacks
- static analysis
- computer systems
- data mining techniques
- decision support system
- information systems