Classification of Adversarial Attacks Using Ensemble Clustering Approach
نویسندگان
چکیده
As more business transactions and information services have been implemented via communication networks, both personal organization assets encounter a higher risk of attacks. To safeguard these, perimeter defence like NIDS (network-based intrusion detection system) can be effective for known intrusions. There has great deal attention within the joint community security data science to improve machine-learning based such that it becomes accurate adversarial attacks, where obfuscation techniques are applied disguise patterns intrusive traffics. The current research focuses on non-payload connections at TCP (transmission control protocol) stack level is applicable different network applications. In contrary wrapper method introduced with benchmark dataset, three new filter models proposed transform feature space without knowledge class labels. These ECT (ensemble clustering transformation) techniques, i.e., ECT-Subspace, ECT-Noise ECT-Combined, developed using concept ensemble generation strategies, random subspace, noise injection their combinations. Based empirical study published dataset four classification algorithms, usually outperform original other alternatives found in literature. This similarly summarized from first experiment basic legitimate direct second recognizing obfuscated addition, analysis algorithmic parameters, size noise, provided as guideline practical use.
منابع مشابه
Ensemble Adversarial Training: Attacks and Defenses
Machine learning models are vulnerable to adversarial examples, inputs maliciously perturbed to mislead the model. These inputs transfer between models, thus enabling black-box attacks against deployed models. Adversarial training increases robustness to attacks by injecting adversarial examples into training data. Surprisingly, we find that although adversarially trained models exhibit strong ...
متن کاملOptimum Ensemble Classification for Fully Polarimetric SAR Data Using Global-Local Classification Approach
In this paper, a proposed ensemble classification for fully polarimetric synthetic aperture radar (PolSAR) data using a global-local classification approach is presented. In the first step, to perform the global classification, the training feature space is divided into a specified number of clusters. In the next step to carry out the local classification over each of these clusters, which cont...
متن کاملAdversarial classification: An adversarial risk analysis approach
Classification problems in security settings are usually contemplated as confrontations in which one or more adversaries try to fool a classifier to obtain a benefit. Most approaches to such adversarial classification problems have focused on game theoretical ideas with strong underlying common knowledge assumptions, which are actually not realistic in security domains. We provide an alternativ...
متن کاملThe ensemble clustering with maximize diversity using evolutionary optimization algorithms
Data clustering is one of the main steps in data mining, which is responsible for exploring hidden patterns in non-tagged data. Due to the complexity of the problem and the weakness of the basic clustering methods, most studies today are guided by clustering ensemble methods. Diversity in primary results is one of the most important factors that can affect the quality of the final results. Also...
متن کاملCombating Adversarial Attacks Using Sparse Representations
It is by now well-known that small adversarial perturbations can induce classification errors in deep neural networks (DNNs). In this paper, we make the case that sparse representations of the input data are a crucial tool for combating such attacks. For linear classifiers, we show that a sparsifying front end is provably effective against `∞-bounded attacks, reducing output distortion due to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2023
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2023.024858