2019
DOI: 10.1007/978-3-030-36708-4_29
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Shot Learning for Intrusion Detection via Attribute Representation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…However, for a Java-Meterpreter, and Meterpreter type's other unknown attacks, its capability may not be satisfactory. In [32], Zhang et al, proposed sparse autoencoders based ZSL method for novel attack detection. It maps known feature space to semantic space, and try to restore the feature space using reconstruction error constraint.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…However, for a Java-Meterpreter, and Meterpreter type's other unknown attacks, its capability may not be satisfactory. In [32], Zhang et al, proposed sparse autoencoders based ZSL method for novel attack detection. It maps known feature space to semantic space, and try to restore the feature space using reconstruction error constraint.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…They are developed by using dynamic features like registry key operations, API invocation, files extension, file directory operation, drop files monitoring, files operations and embedded strings. Intrusion Detection (ALNID) [31], Graph Embeddings [32], Deep Attribute Prediction (DeepAP) [33], and Grassmannian [24]. ZSL can be classified as Inductive ZSL and Transductive ZSL subject to the available information.…”
Section: Features and Their Visualizationmentioning
confidence: 99%
“…The core challenge of ZSOS is how to make the model use limited information of seen classes to understand and segment objects of unseen classes. Typically, this involves combining the visual features of the image with the semantic information of the object [15]. To this end, researchers usually rely on rich semantic descriptions, such as text descriptions of categories or attribute labels, to build a bridge between visual features and semantic concepts.…”
Section: Target Segmentation Technology For Zero Samplesmentioning
confidence: 99%
“…Li et al [26] focused on attribute learning methods to detect unknown attack types. The authors followed a ZSL method to design an NIDS to overcome the limitations in anomaly detection faced by current methods.…”
Section: Related Workmentioning
confidence: 99%