Unknown Network Attack Detection Based on Open Set Recognition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Real Time Traffic Sign Detection and Recognition Algorithm based on Super Fuzzy Set

Advanced Driver Assistance Systems (ADAS) benefit from current infrastructure to discern environmental information. Traffic signs are global guidelines which inform drivers from near characteristics of paths ahead. Traffic Sign Recognition (TSR) system is an ADAS that recognize traffic signs in images captured from road and show information as an adviser or transmit them to other ADASs. In this...

متن کامل

Learning a Neural-network-based Representation for Open Set Recognition

Open set recognition problems exist in many domains. For example in security, new malware classes emerge regularly; therefore malware classi€cation systems need to identify instances from unknown classes in addition to discriminating between known classes. In this paper we present a neural network based representation for addressing the open set recognition problem. In this representation insta...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Scalable Network-Based Buffer Overflow Attack Detection

Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a great deal of research has been invested in defense mechanisms against buffer overflow attack, most of them require modifications to the network applications and/or the platforms that host them. This paper presents a network-based buffer ...

متن کامل

Attack Detection over Network based on C45 and RF Algorithms

In this paper, Intrusion detection is to detect attacks(Intrusions) against a computer system. In the highly networked modern world, conventional techniques of network security such as cryptography, user authentication and intrusion prevention techniques like firewalls are not sufficient to detect new attacks. In this paper, we perform experiments on the kddcup99 data set. We perform dimensiona...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2020

ISSN: 1877-0509

DOI: 10.1016/j.procs.2020.06.104