2010
DOI: 10.1007/978-3-642-13315-2_27
|View full text |Cite
|
Sign up to set email alerts
|

0day Anomaly Detection Made Possible Thanks to Machine Learning

Abstract: Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this purpose, this work relies on the use of machine learning techniques able to issue autonomously traffic models and new attack signatures when new attacks are detected, characterized and classified as such. The ultimate goal deals with being able to instantaneously deploy new defense strategies when a new 0day attack is encountered, than… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Examples of models to represent the network behavior can use neural networks, statistical analysis techniques, and probability theory. The main advantage of this type of detection is that it also detects previously unknown flows [7]. However, there may be instances where flows may be different from the expected normality but not necessarily malicious, resulting in false positive alarms.…”
Section: B Port Scanningmentioning
confidence: 99%
“…Examples of models to represent the network behavior can use neural networks, statistical analysis techniques, and probability theory. The main advantage of this type of detection is that it also detects previously unknown flows [7]. However, there may be instances where flows may be different from the expected normality but not necessarily malicious, resulting in false positive alarms.…”
Section: B Port Scanningmentioning
confidence: 99%
“…Examples of suitable techniques for the creation of a behavioral model are neural networks, statistical analysis techniques and Markov models, as surveyed in the works of Patcha et al [115] and Estevez-Tapiador et al [45]. The main advantage of an anomaly-based IDS is that it can potentially detect also attacks that have never been seen before [114]. Note however that, while an attack is often an anomaly, there exist cases in which events that deviate from the model of normality are not necessarily malicious.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…The concept behind this idea is to make the network responsive enough to adapt to newer scenario (closed-loop control) instead of requiring manual intervention for the configuration of each steps implied by the observationanalysis-decision-execution sequence. Different kinds of applications that would benefit of machine learning have been studied over the past few years like traffic anomaly detection and intrusion detection [12], as well as traffic-informed rerouting [16], [17].…”
Section: Introductionmentioning
confidence: 99%