{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:11:28Z","timestamp":1730322688602,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1145\/3400286.3418252","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T16:46:55Z","timestamp":1606322815000},"page":"161-166","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations"],"prefix":"10.1145","author":[{"given":"Torgeir","family":"Fladby","sequence":"first","affiliation":[{"name":"Oslo Metropolitan University, Oslo, Norway"}]},{"given":"H\u00e5rek","family":"Haugerud","sequence":"additional","affiliation":[{"name":"Oslo Metropolitan University, Oslo, Norway"}]},{"given":"Stefano","family":"Nichele","sequence":"additional","affiliation":[{"name":"Oslo Metropolitan University, Oslo, Norway"}]},{"given":"Kyrre","family":"Begnum","sequence":"additional","affiliation":[{"name":"Oslo Metropolitan University, Oslo, Norway"}]},{"given":"Anis","family":"Yazidi","sequence":"additional","affiliation":[{"name":"Oslo Metropolitan University, Oslo, Norway"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"volume-title":"Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets. JDCTA (International Journal of Digital Content Technology and its Applications 10, 2","year":"2016","author":"Amoli Payam Vahdani","key":"e_1_3_2_1_2_1","unstructured":"Payam Vahdani Amoli , Timo Hamalainen , Gil David , Mikhail Zolotukhin , and Mahsa Mirzamohammad . 2016. Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets. JDCTA (International Journal of Digital Content Technology and its Applications 10, 2 ( 2016 ), 1--13. Payam Vahdani Amoli, Timo Hamalainen, Gil David, Mikhail Zolotukhin, and Mahsa Mirzamohammad. 2016. Unsupervised network intrusion detection systems for zero-day fast-spreading attacks and botnets. JDCTA (International Journal of Digital Content Technology and its Applications 10, 2 (2016), 1--13."},{"key":"e_1_3_2_1_3_1","unstructured":"Red Team Security Consulting. 2018. RED TEAMING METHODOLOGY. (2018). https:\/\/www.redteamsecure.com\/red-teaming-methodology\/ Red Team Security Consulting. 2018. RED TEAMING METHODOLOGY. (2018). https:\/\/www.redteamsecure.com\/red-teaming-methodology\/"},{"volume-title":"CTU Public Datasets. https:\/\/mcfp.felk.cvut.cz\/publicDatasets\/. (2020). [Online","year":"2018","author":"CTU.","key":"e_1_3_2_1_4_1","unstructured":"CTU. 2020. CTU Public Datasets. https:\/\/mcfp.felk.cvut.cz\/publicDatasets\/. (2020). [Online ; accessed 17- September - 2018 ]. CTU. 2020. CTU Public Datasets. https:\/\/mcfp.felk.cvut.cz\/publicDatasets\/. (2020). [Online; accessed 17-September-2018]."},{"key":"e_1_3_2_1_5_1","unstructured":"Torgeir F\u00f8reid Fladby. 2018. Adaptive Network Flow Parameters for Stealthy Botnet Behavior. Master's thesis. Torgeir F\u00f8reid Fladby. 2018. Adaptive Network Flow Parameters for Stealthy Botnet Behavior. Master's thesis."},{"volume-title":"Modelling the Network Behaviour of Malware To Block Malicious Patterns. The Stratosphere Project: a Behavioural Ips. Virus Bulletin, number September","year":"2015","author":"Garcia Sebastian","key":"e_1_3_2_1_6_1","unstructured":"Sebastian Garcia . 2015. Modelling the Network Behaviour of Malware To Block Malicious Patterns. The Stratosphere Project: a Behavioural Ips. Virus Bulletin, number September ( 2015 ), 1--8. Sebastian Garcia. 2015. Modelling the Network Behaviour of Malware To Block Malicious Patterns. The Stratosphere Project: a Behavioural Ips. Virus Bulletin, number September (2015), 1--8."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970038"},{"volume-title":"McDaniel","year":"2016","author":"Grosse Kathrin","key":"e_1_3_2_1_8_1","unstructured":"Kathrin Grosse , Nicolas Papernot , Praveen Manoharan , Michael Backes , and Patrick D . McDaniel . 2016 . Adversarial Perturbations Against Deep Neural Networks for Malware Classification. CoRR abs\/1606.04435 (2016). arXiv:1606.04435 http:\/\/arxiv.org\/abs\/1606.04435 Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick D. McDaniel. 2016. Adversarial Perturbations Against Deep Neural Networks for Malware Classification. CoRR abs\/1606.04435 (2016). arXiv:1606.04435 http:\/\/arxiv.org\/abs\/1606.04435"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"volume-title":"Cisco 2018 Annual Cyber Security Report. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-reports.html. (2018). [PDF","year":"2018","author":"Cisco Systems Inc. 2018.","key":"e_1_3_2_1_10_1","unstructured":"Cisco Systems Inc. 2018. Cisco 2018 Annual Cyber Security Report. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-reports.html. (2018). [PDF ; accessed 17- September - 2018 ]. Cisco Systems Inc. 2018. Cisco 2018 Annual Cyber Security Report. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-reports.html. (2018). [PDF; accessed 17-September-2018]."},{"key":"e_1_3_2_1_11_1","unstructured":"Stratosphere IPS. 2018. STF. https:\/\/www.stratosphereips.org\/stratosphere-testing-framework. (2018). Stratosphere IPS. 2018. STF. https:\/\/www.stratosphereips.org\/stratosphere-testing-framework. (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"volume-title":"Adversarial examples for generative models. arXiv preprint arXiv:1702.06832","year":"2017","author":"Kos Jernej","key":"e_1_3_2_1_13_1","unstructured":"Jernej Kos , Ian Fischer , and Dawn Song . 2017. Adversarial examples for generative models. arXiv preprint arXiv:1702.06832 ( 2017 ). Jernej Kos, Ian Fischer, and Dawn Song. 2017. Adversarial examples for generative models. arXiv preprint arXiv:1702.06832 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"volume-title":"Navigating a Cloud Sky. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/restricted\/rp-navigating-cloudy-sky.pdf. (2018). [PDF","year":"2018","key":"e_1_3_2_1_17_1","unstructured":"McAfee. 2018. Navigating a Cloud Sky. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/restricted\/rp-navigating-cloudy-sky.pdf. (2018). [PDF ; accessed 11- October - 2018 ]. McAfee. 2018. Navigating a Cloud Sky. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/restricted\/rp-navigating-cloudy-sky.pdf. (2018). [PDF; accessed 11-October-2018]."},{"key":"e_1_3_2_1_18_1","volume-title":"NIPS workshop on deep learning and unsupervised feature learning","volume":"2011","author":"Netzer Yuval","year":"2011","unstructured":"Yuval Netzer , Tao Wang , Adam Coates , Alessandro Bissacco , Bo Wu , and Andrew Y Ng . 2011 . Reading digits in natural images with unsupervised feature learning . In NIPS workshop on deep learning and unsupervised feature learning , Vol. 2011 . 5. Yuval Netzer, Tao Wang, Adam Coates, Alessandro Bissacco, Bo Wu, and Andrew Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. In NIPS workshop on deep learning and unsupervised feature learning, Vol. 2011. 5."},{"volume-title":"2016 IEEE European Symposium on. IEEE, 372--387","year":"2016","author":"Papernot Nicolas","key":"e_1_3_2_1_19_1","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . 2016 . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 372--387 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372--387."},{"volume-title":"Data Mining, 2006. ICDM'06. Sixth International Conference on. IEEE, 488--498","year":"2006","author":"Perdisci Roberto","key":"e_1_3_2_1_20_1","unstructured":"Roberto Perdisci , Guofei Gu , and Wenke Lee . 2006 . Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems . In Data Mining, 2006. ICDM'06. Sixth International Conference on. IEEE, 488--498 . Roberto Perdisci, Guofei Gu, and Wenke Lee. 2006. Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In Data Mining, 2006. ICDM'06. Sixth International Conference on. IEEE, 488--498."},{"volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 108--125","year":"2008","author":"Rieck Konrad","key":"e_1_3_2_1_21_1","unstructured":"Konrad Rieck , Thorsten Holz , Carsten Willems , Patrick D\u00fcssel , and Pavel Laskov . 2008 . Learning and classification of malware behavior . In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 108--125 . Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick D\u00fcssel, and Pavel Laskov. 2008. Learning and classification of malware behavior. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 108--125."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00019"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1968.1098903"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/7.705889"},{"volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","year":"2013","author":"Szegedy Christian","key":"e_1_3_2_1_25_1","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"volume-title":"Rajendra Rana Bhat, and Xiaolin Li","year":"2017","author":"Yuan Xiaoyong","key":"e_1_3_2_1_26_1","unstructured":"Xiaoyong Yuan , Pan He , Qile Zhu , Rajendra Rana Bhat, and Xiaolin Li . 2017 . Adversarial examples: Attacks and de fenses for deep learning. arXiv preprint arXiv:1712.07107 (2017). Xiaoyong Yuan, Pan He, Qile Zhu, Rajendra Rana Bhat, and Xiaolin Li. 2017. Adversarial examples: Attacks and defenses for deep learning. arXiv preprint arXiv:1712.07107 (2017)."}],"event":{"name":"RACS '20: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Gwangju Republic of Korea","acronym":"RACS '20"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400286.3418252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T23:05:17Z","timestamp":1692918317000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400286.3418252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":26,"alternative-id":["10.1145\/3400286.3418252","10.1145\/3400286"],"URL":"https:\/\/doi.org\/10.1145\/3400286.3418252","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]},"assertion":[{"value":"2020-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}