메뉴 건너뛰기




Volumn , Issue , 2014, Pages 197-211

Practical evasion of a learning-based classifier: A case study

Author keywords

[No Author keywords available]

Indexed keywords

TAXONOMIES;

EID: 84914145282     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.20     Document Type: Conference Paper
Times cited : (389)

References (47)
  • 3
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of driveby-download attacks and malicious Java Script code
    • M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of driveby-download attacks and malicious Java Script code," in International Conference on World Wide Web (WWW), 2010, pp. 281-290.
    • (2010) International Conference on World Wide Web (WWW) , pp. 281-290
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 8
    • 84888989407 scopus 로고    scopus 로고
    • Using naive bayes to detect spammy names in social networks
    • D. M. Freeman, "Using naive bayes to detect spammy names in social networks," in ACM Workshop on AI and Security (AISec), 2013, pp. 3-12.
    • (2013) ACM Workshop on AI and Security (AISec) , pp. 3-12
    • Freeman, D.M.1
  • 10
  • 11
    • 0027640858 scopus 로고
    • Learning in the presence of malicious errors
    • M. Kearns and M. Li, "Learning in the presence of malicious errors," SIAM Journal on Computing, vol. 22, no. 4, pp. 807-837, 1993.
    • (1993) SIAM Journal on Computing , vol.22 , Issue.4 , pp. 807-837
    • Kearns, M.1    Li, M.2
  • 13
    • 84873445143 scopus 로고    scopus 로고
    • Security analysis of online centroid anomaly detection
    • M. Kloft and P. Laskov, "Security analysis of online centroid anomaly detection," Journal of Machine Learning Research, vol. 13, pp. 3133-3176, 2012.
    • (2012) Journal of Machine Learning Research , vol.13 , pp. 3133-3176
    • Kloft, M.1    Laskov, P.2
  • 20
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • P. Fogla and W. Lee, "Evading network anomaly detection systems: formal reasoning and practical techniques," in ACM Conference on Computer and Communications Security, 2006, pp. 59-68.
    • (2006) ACM Conference on Computer and Communications Security , pp. 59-68
    • Fogla, P.1    Lee, W.2
  • 24
    • 84914168205 scopus 로고    scopus 로고
    • Department of Computer Science, George Mason University, 4400 University Drive MSN 4A5, Fairfax, VA 22030-4444 USA, Tech. Rep. GMU-CS-TR-2012-5
    • -, "Malicious PDF detection using metadata and structural features," Available at http://cs.gmu.edu, Department of Computer Science, George Mason University, 4400 University Drive MSN 4A5, Fairfax, VA 22030-4444 USA, Tech. Rep. GMU-CS-TR-2012-5, 2012.
    • (2012) Malicious PDF Detection Using Metadata and Structural Features
    • Smutz, C.1    Stavrou, A.2
  • 27
    • 84863160317 scopus 로고    scopus 로고
    • Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers
    • C. Yang, R. C. Harkreader, and G. Gu, "Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers," in Recent Adances in Intrusion Detection (RAID), 2011, pp. 318-337.
    • (2011) Recent Adances in Intrusion Detection (RAID) , pp. 318-337
    • Yang, C.1    Harkreader, R.C.2    Gu, G.3
  • 28
    • 84872026771 scopus 로고    scopus 로고
    • Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
    • M. Brennan, S. Afroz, and R. Greenstadt, "Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity," ACM Transactions on Information Systems Security, vol. 15, no. 3, pp. 1-22, 2012.
    • (2012) ACM Transactions on Information Systems Security , vol.15 , Issue.3 , pp. 1-22
    • Brennan, M.1    Afroz, S.2    Greenstadt, R.3
  • 31
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp. 5-32, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 32
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov, "Abusing file processing in malware detectors for fun and profit," in IEEE Symposium on Security and Privacy, 2012, pp. 80-94.
    • (2012) IEEE Symposium on Security and Privacy , pp. 80-94
    • Jana, S.1    Shmatikov, V.2
  • 34
    • 0001473437 scopus 로고
    • On estimation of a probability density function and mode
    • E. Parzen, "On estimation of a probability density function and mode," The Annals of Mathematical Statistics, vol. 33, no. 3, pp. 1065-1076, 1962.
    • (1962) The Annals of Mathematical Statistics , vol.33 , Issue.3 , pp. 1065-1076
    • Parzen, E.1
  • 35
    • 34249753618 scopus 로고
    • Support vector networks
    • C. Cortes and V. Vapnik, "Support vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.
    • (1995) Machine Learning , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 38
    • 33846910249 scopus 로고    scopus 로고
    • Language models for detection of unknown attacks in network traffic
    • K. Rieck and P. Laskov, "Language models for detection of unknown attacks in network traffic," Journal in Computer Virology, vol. 2, pp. 243-256, 2007.
    • (2007) Journal in Computer Virology , vol.2 , pp. 243-256
    • Rieck, K.1    Laskov, P.2
  • 39
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • to appear
    • J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," Journal of Machine Learning Research, 2006, to appear.
    • (2006) Journal of Machine Learning Research
    • Kolter, J.1    Maloof, M.2
  • 44
    • 78049529865 scopus 로고    scopus 로고
    • Learning to classify with missing and corrupted features
    • O. Dekel, O. Shamir, and L. Xiao, "Learning to classify with missing and corrupted features," Machine Learning, vol. 81, no. 2, pp. 149-178, 2010.
    • (2010) Machine Learning , vol.81 , Issue.2 , pp. 149-178
    • Dekel, O.1    Shamir, O.2    Xiao, L.3
  • 46
    • 61749083929 scopus 로고    scopus 로고
    • McPAD: A multiple classifier system for accurate payload-based anomaly detection
    • R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, "McPAD: A multiple classifier system for accurate payload-based anomaly detection," Computer Networks, vol. 53, no. 6, pp. 864-881, 2009.
    • (2009) Computer Networks , vol.53 , Issue.6 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 47
    • 70349319703 scopus 로고    scopus 로고
    • Multiple classifier systems for adversarial classification tasks
    • B. Biggio, G. Fumera, and F. Roli, "Multiple classifier systems for adversarial classification tasks." in Multiple Classifier Systems, 2009, pp. 132-141.
    • (2009) Multiple Classifier Systems , pp. 132-141
    • Biggio, B.1    Fumera, G.2    Roli, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.