2018
DOI: 10.1016/j.cose.2018.02.015
|View full text |Cite
|
Sign up to set email alerts
|

A training-resistant anomaly detection system

Abstract: Modern network intrusion detection systems rely on machine learning techniques to detect trac anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous trac. This paper presents an intrusion detection system (IDS) that is able to detect common network attacks including but not limited to, denial-of-service, bot nets, intrusions, and netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(21 citation statements)
references
References 17 publications
4
17
0
Order By: Relevance
“…We implemented this approach and performed a case study on a denial-of-service attack detection scenario using network traffic data recorded from a real-world system. Our results show that our framework can systematically generate attack schemes bypassing the current state-of-the-art defences, i.e., multiple clustering instances [11]. We also show that for any successful attack our framework can generate an appropriate defence without disturbing the normal (benign) traffic.…”
Section: Introductionmentioning
confidence: 82%
See 4 more Smart Citations
“…We implemented this approach and performed a case study on a denial-of-service attack detection scenario using network traffic data recorded from a real-world system. Our results show that our framework can systematically generate attack schemes bypassing the current state-of-the-art defences, i.e., multiple clustering instances [11]. We also show that for any successful attack our framework can generate an appropriate defence without disturbing the normal (benign) traffic.…”
Section: Introductionmentioning
confidence: 82%
“…Outliers corresponds to statistical abnormalities that do not reflect changes in the system behaviour. As such, they are considered unharmful [11]. On the contrary, the formation of clusters at unexpected spaces of the grid may result from threatening persistent attacks.…”
Section: Background and Case Study 21 Clustering-based Idsmentioning
confidence: 99%
See 3 more Smart Citations