메뉴 건너뛰기




Volumn , Issue , 2013, Pages 99-109

Approaches to adversarial drift

Author keywords

adversarial machine learning; concept drift; malware classification

Indexed keywords

ADVERSARIAL ENVIRONMENTS; BINARY CLASSIFICATION; CONCEPT DRIFTS; FEATURE ENGINEERINGS; MACHINE-LEARNING; MALWARE CLASSIFICATIONS; POSITION PAPERS; PROVIDE GUIDANCES;

EID: 84888987784     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517312.2517320     Document Type: Conference Paper
Times cited : (69)

References (52)
  • 2
    • 80053015779 scopus 로고    scopus 로고
    • Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
    • Springer Berlin Heidelberg
    • B. Biggio, I. Corona, and G. Fumera. Bagging classifiers for fighting poisoning attacks in adversarial classification tasks. In Multiple Classifier Systems, pages 350-359. Springer Berlin Heidelberg, 2011.
    • (2011) Multiple Classifier Systems , pp. 350-359
    • Biggio, B.1    Corona, I.2    Fumera, G.3
  • 16
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multiclass support vector machines
    • C.-W. Hsu and C.-J. Lin. A comparison of methods for multiclass support vector machines. Neural Networks, IEEE Transactions on, 13(2):415-425, 2002.
    • (2002) Neural Networks, IEEE Transactions on , vol.13 , Issue.2 , pp. 415-425
    • Hsu, C.-W.1    Lin, C.-J.2
  • 24
    • 84869390927 scopus 로고    scopus 로고
    • Knowing your enemy: Understanding and detecting malicious web advertising
    • Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang. Knowing your enemy: Understanding and detecting malicious web advertising. In CCS, 2012.
    • (2012) CCS
    • Li, Z.1    Zhang, K.2    Xie, Y.3    Yu, F.4    Wang, X.5
  • 25
    • 77955660961 scopus 로고    scopus 로고
    • Mining adversarial patterns via regularized loss minimization
    • July
    • W. Liu and S. Chawla. Mining adversarial patterns via regularized loss minimization. Machine Learning, 81(1):69-83, July 2010.
    • (2010) Machine Learning , vol.81 , Issue.1 , pp. 69-83
    • Liu, W.1    Chawla, S.2
  • 27
    • 80755169472 scopus 로고    scopus 로고
    • Surf: Detecting and measuring search poisoning
    • L. Lu, R. Perdisci, and W. Lee. Surf: Detecting and measuring search poisoning. In CCS, 2011.
    • (2011) CCS
    • Lu, L.1    Perdisci, R.2    Lee, W.3
  • 31
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • IEEE
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In Security and Privacy, 2005 IEEE Symposium on, pages 226-241. IEEE, 2005.
    • (2005) Security and Privacy, 2005 IEEE Symposium on , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 32
    • 33750332606 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • Springer
    • J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In Recent Advances in Intrusion Detection, pages 81-105. Springer, 2006.
    • (2006) Recent Advances in Intrusion Detection , pp. 81-105
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 33
    • 1942418620 scopus 로고    scopus 로고
    • On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes
    • A. Y. Ng and M. I. Jordan. On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes. In NIPS, pages 841-848, 2001.
    • (2001) NIPS , pp. 841-848
    • Ng, A.Y.1    Jordan, M.I.2
  • 38
    • 75149176174 scopus 로고    scopus 로고
    • Ensemble-based classifiers
    • Feb.
    • L. Rokach. Ensemble-based classifiers. Artif. Intell. Rev., 33(1-2):1-39, Feb. 2010.
    • (2010) Artif. Intell. Rev. , vol.33 , Issue.1-2 , pp. 1-39
    • Rokach, L.1
  • 40
    • 84888996861 scopus 로고    scopus 로고
    • Autonomous learning for detection of javascript attacks: Vision or reality?
    • G. Schwenk, A. Bikadorov, T. Krueger, and K. Rieck. Autonomous learning for detection of javascript attacks: Vision or reality? In AISEC, 2012.
    • (2012) AISEC
    • Schwenk, G.1    Bikadorov, A.2    Krueger, T.3    Rieck, K.4
  • 45
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • IEEE
    • R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 305-316. IEEE, 2010.
    • (2010) Security and Privacy (SP), 2010 IEEE Symposium on , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 52
    • 80755134983 scopus 로고    scopus 로고
    • Traffic morphing: An efficient defense against statistical traffic analysis
    • The Internet Society
    • C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS. The Internet Society, 2009.
    • (2009) NDSS
    • Wright, C.V.1    Coull, S.E.2    Monrose, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.