Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations.
Torgeir FladbyHårek HaugerudStefano NicheleKyrre M. BegnumAnis YazidiPublished in: RACS (2020)
Keyphrases
- intrusion detection system
- machine learning
- intrusion detection
- network security
- anomaly detection
- computer networks
- distributed intrusion detection
- network intrusion detection
- network traffic
- computer systems
- decision trees
- unauthorized access
- cyber security
- learning algorithm
- attack detection
- data mining
- network intrusion detection systems
- knowledge discovery
- pattern recognition
- alert correlation
- normal behavior
- text classification
- network attacks
- k means
- misuse detection
- network intrusions
- network traffic data
- intrusion prevention
- metadata
- data sets
- network monitoring
- cyber attacks
- databases
- information retrieval
- feature selection
- unsupervised learning
- text mining
- supervised learning
- database systems