[HTML][HTML] Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection

T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli - Computers & Security, 2023 - Elsevier
There is an astounding growth in the adoption of machine learners (MLs) to craft intrusion
detection systems (IDSs). These IDSs model the behavior of a target system during a …

Unsupervised algorithms to detect zero-day attacks: Strategy and application

T Zoppi, A Ceccarelli, A Bondavalli - Ieee Access, 2021 - ieeexplore.ieee.org
In the last decade, researchers, practitioners and companies struggled for devising
mechanisms to detect cyber-security threats. Among others, those efforts originated rule …

Black-box error diagnosis in Deep Neural Networks for computer vision: a survey of tools

P Fraternali, F Milani, RN Torres… - Neural Computing and …, 2023 - Springer
Abstract The application of Deep Neural Networks (DNNs) to a broad variety of tasks
demands methods for coping with the complex and opaque nature of these architectures …

Unsupervised anomaly detectors to detect intrusions in the current threat landscape

T Zoppi, A Ceccarelli, T Capecchi… - ACM/IMS Transactions on …, 2021 - dl.acm.org
Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a
given system. It is acknowledged as a reliable answer to the identification of zero-day …

Meta-learning to improve unsupervised intrusion detection in cyber-physical systems

T Zoppi, M Gharib, M Atif, A Bondavalli - ACM Transactions on Cyber …, 2021 - dl.acm.org
Artificial Intelligence (AI)-based classifiers rely on Machine Learning (ML) algorithms to
provide functionalities that system architects are often willing to integrate into critical Cyber …

Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection

T Zoppi, A Ceccarelli - Journal of Network and Computer Applications, 2021 - Elsevier
In the last decades, researchers, practitioners and companies struggled in devising
mechanisms to detect malicious activities originating security threats. Amongst the many …

[HTML][HTML] On the educated selection of unsupervised algorithms via attacks and anomaly classes

T Zoppi, A Ceccarelli, L Salani, A Bondavalli - Journal of Information …, 2020 - Elsevier
Anomaly detection aims at finding patterns in data that do not conform to the expected
behavior. It is largely adopted in intrusion detection systems, relying on unsupervised …

Cryingjackpot: Network flows and performance counters against cryptojacking

G Gomes, L Dias, M Correia - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
Cryptojacking, the appropriation of users' computational resources without their knowledge
or consent to obtain cryp-tocurrencies, is a widespread attack, relatively easy to implement …

Into the unknown: Unsupervised machine learning algorithms for anomaly-based intrusion detection

T Zoppi, A Ceccarelli… - 2020 50th Annual IEEE …, 2020 - ieeexplore.ieee.org
Anomaly detection aims at identifying patterns in data that do not conform to the expected
behavior, relying on machine-learning algorithms that are suited for binary classification. It …

On the properness of incorporating binary classification machine learning algorithms into safety-critical systems

M Gharib, T Zoppi, A Bondavalli - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Manufacturers are willing to incorporate Machine Learning (ML) algorithms into their
systems, especially those considered as Safety-Critical Systems (SCS). ML algorithms that …