ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761337
|View full text |Cite
|
Sign up to set email alerts
|

Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
67
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 55 publications
(69 citation statements)
references
References 12 publications
1
67
0
1
Order By: Relevance
“…However, surprisingly, proper analyses and efficient solutions to this menace are scarce in the cybersecurity domain. The field of network intrusion detection is poorly investigated [10,11], while multiple works exist in the areas of malware, phishing, and spam detection [6,[12][13][14][15][16][17]. In particular, although several studies have shown the effectiveness of adversarial evasion attacks against botnet detectors [10,11,18,19], there is a lack of proposals to counter this menace that are feasible for real world environments.…”
Section: Introductionmentioning
confidence: 99%
“…However, surprisingly, proper analyses and efficient solutions to this menace are scarce in the cybersecurity domain. The field of network intrusion detection is poorly investigated [10,11], while multiple works exist in the areas of malware, phishing, and spam detection [6,[12][13][14][15][16][17]. In particular, although several studies have shown the effectiveness of adversarial evasion attacks against botnet detectors [10,11,18,19], there is a lack of proposals to counter this menace that are feasible for real world environments.…”
Section: Introductionmentioning
confidence: 99%
“…e literature [75] proposed a new anti-botnet traffic generator framework based on deep reinforcement learning (DRL), which could effectively generate reverse traffic flow through the RL algorithm and Markov decision process (MDP).…”
Section: Fnnmentioning
confidence: 99%
“…An example of a similar implementation is the fast gradient sign method (FGSM) 12 . Additionally, there are some other non-differentiable objective based methods in the area of reinforcement learning 13,14 that have been explored. These methods are designed with an underlying assumption that the distribution of the new data generated from the ' ′  network of these systems is significantly different form the ones that the IDS ( ' ′  network) is trained on.…”
Section: Related Workmentioning
confidence: 99%