Statistical Classification and Computer Security

نویسنده

  • Alvaro A. Cárdenas
چکیده

During the last couple of years we have been addressing classification problems in computer security applications. In particular, we have focused on three key items: (1) evaluation metrics for classifiers in adversarial environments, (2) the design of optimal classifiers against adaptive adversaries, and (3) voting algorithms for the combination of multiple classifiers. Our results have been published in computer security [1, 2, 3, 4] and machine learning [5, 6, 7, 8] venues. In this abstract we summarize our results, discuss our current work, and mention some other open problems in the intersection of machine learning and computer security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

Statistical Analysis on IoT Research Trends: A Survey

Internet of Things (IoT) is a novel and emerging paradigm to connect real/physical and virtual/logical world together. So, it will be necessary to apply other related scientific concepts in order to achieve this goal. The main focus of this paper is to identify the research topics in IoT. For this purpose, a comprehensive study has been conducted on the vast range of research articles. IoT conc...

متن کامل

Detection of Fake Accounts in Social Networks Based on One Class Classification

Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007