[HTML][HTML] Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection
There is an astounding growth in the adoption of machine learners (MLs) to craft intrusion
detection systems (IDSs). These IDSs model the behavior of a target system during a …
detection systems (IDSs). These IDSs model the behavior of a target system during a …
Unsupervised algorithms to detect zero-day attacks: Strategy and application
In the last decade, researchers, practitioners and companies struggled for devising
mechanisms to detect cyber-security threats. Among others, those efforts originated rule …
mechanisms to detect cyber-security threats. Among others, those efforts originated rule …
Black-box error diagnosis in Deep Neural Networks for computer vision: a survey of tools
Abstract The application of Deep Neural Networks (DNNs) to a broad variety of tasks
demands methods for coping with the complex and opaque nature of these architectures …
demands methods for coping with the complex and opaque nature of these architectures …
Unsupervised anomaly detectors to detect intrusions in the current threat landscape
T Zoppi, A Ceccarelli, T Capecchi… - ACM/IMS Transactions on …, 2021 - dl.acm.org
Anomaly detection aims at identifying unexpected fluctuations in the expected behavior of a
given system. It is acknowledged as a reliable answer to the identification of zero-day …
given system. It is acknowledged as a reliable answer to the identification of zero-day …
Meta-learning to improve unsupervised intrusion detection in cyber-physical systems
Artificial Intelligence (AI)-based classifiers rely on Machine Learning (ML) algorithms to
provide functionalities that system architects are often willing to integrate into critical Cyber …
provide functionalities that system architects are often willing to integrate into critical Cyber …
Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection
T Zoppi, A Ceccarelli - Journal of Network and Computer Applications, 2021 - Elsevier
In the last decades, researchers, practitioners and companies struggled in devising
mechanisms to detect malicious activities originating security threats. Amongst the many …
mechanisms to detect malicious activities originating security threats. Amongst the many …
[HTML][HTML] On the educated selection of unsupervised algorithms via attacks and anomaly classes
Anomaly detection aims at finding patterns in data that do not conform to the expected
behavior. It is largely adopted in intrusion detection systems, relying on unsupervised …
behavior. It is largely adopted in intrusion detection systems, relying on unsupervised …
Cryingjackpot: Network flows and performance counters against cryptojacking
Cryptojacking, the appropriation of users' computational resources without their knowledge
or consent to obtain cryp-tocurrencies, is a widespread attack, relatively easy to implement …
or consent to obtain cryp-tocurrencies, is a widespread attack, relatively easy to implement …
Into the unknown: Unsupervised machine learning algorithms for anomaly-based intrusion detection
T Zoppi, A Ceccarelli… - 2020 50th Annual IEEE …, 2020 - ieeexplore.ieee.org
Anomaly detection aims at identifying patterns in data that do not conform to the expected
behavior, relying on machine-learning algorithms that are suited for binary classification. It …
behavior, relying on machine-learning algorithms that are suited for binary classification. It …
On the properness of incorporating binary classification machine learning algorithms into safety-critical systems
Manufacturers are willing to incorporate Machine Learning (ML) algorithms into their
systems, especially those considered as Safety-Critical Systems (SCS). ML algorithms that …
systems, especially those considered as Safety-Critical Systems (SCS). ML algorithms that …