首页> 外文期刊>Quality Control, Transactions >Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review
【24h】

Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review

机译:对抗机器学习应用于入侵和恶意软件方案:系统评论

获取原文
获取原文并翻译 | 示例
           

摘要

Cyber-security is the practice of protecting computing systems and networks from digital attacks, which are a rising concern in the Information Age. With the growing pace at which new attacks are developed, conventional signature based attack detection methods are often not enough, and machine learning poses as a potential solution. Adversarial machine learning is a research area that examines both the generation and detection of adversarial examples, which are inputs specially crafted to deceive classifiers, and has been extensively studied specifically in the area of image recognition, where minor modifications are performed on images that cause a classifier to produce incorrect predictions. However, in other fields, such as intrusion and malware detection, the exploration of such methods is still growing. The aim of this survey is to explore works that apply adversarial machine learning concepts to intrusion and malware detection scenarios. We concluded that a wide variety of attacks were tested and proven effective in malware and intrusion detection, although their practicality was not tested in intrusion scenarios. Adversarial defenses were substantially less explored, although their effectiveness was also proven at resisting adversarial attacks. We also concluded that, contrarily to malware scenarios, the variety of datasets in intrusion scenarios is still very small, with the most used dataset being greatly outdated.
机译:网络安全是保护计算系统和网络从数字攻击保护,这是信息时代的不断担忧。随着开发新攻击的越来越多的速度,传统的基于签名的攻击检测方法通常不够,并且机器学习姿势作为潜在的解决方案。对抗机器学习是一种研究领域,其研究了对抗性示例的产生和检测,其是专门制作欺骗分类器的输入,并且已经在图像识别面积中被广泛地研究,其中对导致A的图像进行微调修改分类器产生不正确的预测。然而,在其他领域,例如入侵和恶意软件检测,这些方法的探索仍在增长。本调查的目的是探索将对抗机器学习概念应用于入侵和恶意软件检测方案的作品。我们得出结论,在恶意软件和入侵检测中测试了各种各样的攻击,虽然他们的实用性在入侵情景中没有测试。探索的对抗性防御大大缺乏,尽管其有效性也被证明在抵抗对抗性袭击方面。我们还得出结论,与恶意软件情景相反,入侵情景中的各种数据集仍然非常小,最常用的数据集具有大大过时。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号