咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Classification of Adversarial ... 收藏

Classification of Adversarial Attacks Using Ensemble Clustering Approach

作     者:Pongsakorn Tatongjai Tossapon Boongoen Natthakan Iam-On Nitin Naik Longzhi Yang 

作者机构:Center of Excellence in AI&Emerging TechnologiesSchool of ITMae Fah Luang UniversityChiang RaiThailand Department of Computer ScienceAberystwyth UniversityAberystwythUnited Kingdom School of Informatics and Digital EngineeringAston UniversityBirminghamUnited Kingdom Department of Computer and Information SciencesNorthumbria UniversityNewcastleUnited Kingdom 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2023年第74卷第2期

页      面:2479-2498页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 08[工学] 080203[工学-机械设计及理论] 0835[工学-软件工程] 0802[工学-机械工程] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:British Council National Research Council of Thailand, NRCT 

主  题:Intrusion detection adversarial attack machine learning feature transformation ensemble clustering 

摘      要:As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known *** has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive *** current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network *** contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class *** ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their *** on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the *** is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated *** addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分