Open Set Recognition with Dissimilarity Weight for Unknown Attack Detection
نویسندگان
چکیده
As information technology advances, it provides user convenience but also has more vulnerabilities than ever before. In particular, attackers use advanced techniques to perform new attacks. cyber security, such attacks are defined as unknown and target previously undetected or excavate gaps in the system. Because these unidentified unanalyzed, they difficult identify signature-based misuse detection that learns rules patterns. Furthermore, anomaly-based from normal data detect outliers cannot accurately, because does not distinguish between known To overcome problems, this study applied Open-Set Recognition with dissimilarity weight(OSRDW). A OSRDW method was used effectively train extreme value distribution, which calculated by applying weight, through attack’s weights were classified Through research analysis, attack divide two types, three sets(NSL-KDD, UNSW-NB15, CICIDS-2017) experiment. For first type of attack, rate proposed approximately 10%–20% better conventional method. second accuracy higher for The experimental results confirmed had performance detecting detected various sets.
منابع مشابه
Fusion Classifier for Open-Set Face Recognition with Pose Variations
A fusion classifier composed of two modules, one made by a hidden Markov model (HMM) and the other by a support vector machine (SVM), is proposed to recognize faces with pose variations in open-set recognition settings. The HMM module captures the evolution of facial features across a subject’s face using the subject’s facial images only, without referencing to the faces of others. Because of t...
متن کاملKDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually through incorporation of attack signatures results in meaningful but weak rules as it is difficult to define thresholds. This paper utilizes a hybrid procedure for developing rules by combining signature analysis with automa...
متن کاملA Real Time Traffic Sign Detection and Recognition Algorithm based on Super Fuzzy Set
Advanced Driver Assistance Systems (ADAS) benefit from current infrastructure to discern environmental information. Traffic signs are global guidelines which inform drivers from near characteristics of paths ahead. Traffic Sign Recognition (TSR) system is an ADAS that recognize traffic signs in images captured from road and show information as an adviser or transmit them to other ADASs. In this...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولNovelty-Aware Attack Recognition - Intrusion Detection with Organic Computing Techniques
A typical task of intrusion detection systems is to detect known kinds of attacks by analyzing network traffic. In this article, we will take a step forward and enable such a system to recognize very new kinds of attacks by means of novelty-awareness mechanisms. That is, an intrusion detection system will be able to recognize deficits in its own knowledge and to react accordingly. It will prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3277871