Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy 2021
DOI: 10.1145/3422337.3447833
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…It also allows resource sharing among users in a transparent manner. Some algorithms have been proposed to detect outliers in distributed systems [9,35,41]; hence, including distributed systems as a property of outlier explanation techniques (Item 10) is necessary. Now, we summarize Table 4.…”
Section: Summary Of Properties Of the Surveyed Outlier Explanation Te...mentioning
confidence: 99%
“…It also allows resource sharing among users in a transparent manner. Some algorithms have been proposed to detect outliers in distributed systems [9,35,41]; hence, including distributed systems as a property of outlier explanation techniques (Item 10) is necessary. Now, we summarize Table 4.…”
Section: Summary Of Properties Of the Surveyed Outlier Explanation Te...mentioning
confidence: 99%
“…Advanced Persistent Threat (APT) attacks have become a major threat to modern enterprises [8], [57]. Existing Endpoint Detection and Response (EDR) systems adopted by these enterprises to defend against cyber attacks have difficulties in countering APT attacks due to the lack of capability to recover the complex causality relationships between the steps of APT attacks [17], [50], [76], [66], [64], [43]. Therefore, practitioners and researchers [73], [13], [25], [59], [30], [69], [75] now analyze the system auditing events in provenance data to recover APT attack scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…With the continuous expansion of cloud services and the diversification of applications, the load data of cloud servers exhibit high dynamism and complexity. These load data usually exist in the form of time series, containing rich information [2]. This load data, typically in the form of time series, contains rich information, making effective prediction and anomaly detection crucial for resource scheduling, fault prevention, and system optimization [3].…”
Section: Introductionmentioning
confidence: 99%