Machine Learning in Security Applications

作者: Davide Ariu , Giorgio Giacinto , Roberto Tronci , Igino Corona

DOI:

关键词: Human-computer interaction in information securityComputer security modelSecurity engineeringSoftware security assuranceMachine learningSecurity information and event managementAttack patternsComputer securityInformation securityLogical securityArtificial intelligenceComputer science

摘要: One of the most important assets to be protected is information, as every aspect life a society deeply depends on available information. Nowadays, information stored, processed, and communicated by computers. It turns out that computers represent critical tool in modern society. A number protection mechanisms are so far, such antivirus software tools, biometric access control systems. For their effectiveness, frequent updates needed, due rapid evolution attack patterns. In fact, attacks often devised spread running computer programs, which can produce new effective short time frame. machine learning techniques with generalization capability one favorite approaches deploy detection mechanisms. this paper, we discuss should followed when devising for security applications. particular, will focus testing methodologies, performance measures, aimed at reducing intrinsic variability application exhibit real-world scenarios.

参考文章(50)
Emanuela Marasco, Peter Johnson, Carlo Sansone, Stephanie Schuckers, Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism international conference on multiple classifier systems. pp. 309- 318 ,(2011) , 10.1007/978-3-642-21557-5_33
Richard A. Kemmerer, Christopher Kruegel, Darren Mutz, Giovanni Vigna, William Robertson, Reverse Engineering of Network Signatures ,(2005)
Samuel Patton, An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT Proceedings of RAID2001, Davis, CA, USA. ,(2001)
Pavel Laskov, Patrick Düssel, Christin Schäfer, Konrad Rieck, Learning intrusion detection: supervised or unsupervised? international conference on image analysis and processing. pp. 50- 57 ,(2005) , 10.1007/11553595_6
Pavel Laskov, Marius Kloft, Online Anomaly Detection under Adversarial Impact international conference on artificial intelligence and statistics. pp. 405- 412 ,(2010)
Thomas G. Dietterich, Ensemble Methods in Machine Learning Multiple Classifier Systems. pp. 1- 15 ,(2000) , 10.1007/3-540-45014-9_1
Roberto Tronci, Giorgio Giacinto, Fabio Roli, Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method machine learning and data mining in pattern recognition. ,vol. 5632, pp. 163- 177 ,(2009) , 10.1007/978-3-642-03070-3_13
Federico Maggi, William Robertson, Christopher Kruegel, Giovanni Vigna, Protecting a Moving Target: Addressing Web Application Concept Drift recent advances in intrusion detection. pp. 21- 40 ,(2009) , 10.1007/978-3-642-04342-0_2
Simon P Chung, Aloysius K Mok, None, Advanced allergy attacks: does a corpus really help recent advances in intrusion detection. pp. 236- 255 ,(2007) , 10.1007/978-3-540-74320-0_13