Šrndić et al., 2014 - Google Patents
Practical evasion of a learning-based classifier: A case studyŠrndić et al., 2014
View PDF- Document ID
- 14966681153910531461
- Author
- Šrndić N
- Laskov P
- Publication year
- Publication venue
- 2014 IEEE symposium on security and privacy
External Links
Snippet
Learning-based classifiers are increasingly used for detection of various forms of malicious data. However, if they are deployed online, an attacker may attempt to evade them by manipulating the data. Examples of such attacks have been previously studied under the …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Šrndić et al. | Practical evasion of a learning-based classifier: A case study | |
Somesha et al. | Efficient deep learning techniques for the detection of phishing websites | |
Chio et al. | Machine learning and security: Protecting systems with data and algorithms | |
Tavabi et al. | Darkembed: Exploit prediction with neural language models | |
Thomas et al. | Machine learning approaches in cyber security analytics | |
Biggio et al. | Is data clustering in adversarial settings secure? | |
Smutz et al. | When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. | |
Biggio et al. | Security evaluation of support vector machines in adversarial environments | |
Zhao et al. | A review of computer vision methods in network security | |
Ramanathan et al. | phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training | |
Khorshidpour et al. | Evaluation of random forest classifier in security domain | |
Chen et al. | Teacher model fingerprinting attacks against transfer learning | |
Devine et al. | An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions. | |
Hassan et al. | SQL injection vulnerability detection using deep learning: a feature-based approach | |
Takahata et al. | Determining motion of nonrigid objects by active tubes | |
Mao et al. | EvadeRL: Evading PDF malware classifiers with deep reinforcement learning | |
Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
Kulkarni et al. | Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques | |
Maghsoudimehrabani et al. | Proactive detection of query-based adversarial scenarios in nlp systems | |
Dmitrenko | Dnn model extraction attacks using prediction interfaces | |
DeLoach et al. | Twitter-enhanced Android malware detection | |
Bhusal et al. | Adversarial patterns: Building robust android malware classifiers | |
Vähäkainu et al. | Adversarial Poisoning Attack's Impact on Prediction Functionality of ML-Based Feedback Loop System in Cyber-Physical Context | |
Mosli | Crafting adversarial examples using particle swarm optimization | |
Chen | Intelligent Malware Detection Using File-to-file Relations and Enhancing its Security against Adversarial Attacks |