Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms. Indeed, IDSs themselves are part of the computing infrastructure, and thus they may be attacked by the same adversaries they are designed to detect. This is a...
-
2013 (v1)PublicationUploaded on: April 14, 2023
-
2008 (v1)Publication
Multiple Classifier Systems (MCS) have been applied successfully in many different research fields, among them the detection of intrusions in computer systems. As an example, in the intrusion detection field, MCS may be motivated by the presence of different network protocols (and related services, with specific features), multiple concurrent...
Uploaded on: February 7, 2024 -
2009 (v1)Publication
In this paper, we critically review the issue of information fusion for computer security, both in terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main strengths and weaknesses of currently used approaches and propose some research issues that should be investigated in the future. (C) 2009 Elsevier B.V....
Uploaded on: April 14, 2023 -
2011 (v1)Publication
Pattern recognition systems have been widely used in adversarial classification tasks like spam filtering and intrusion detection in computer networks. In these applications a malicious adversary may successfully mislead a classifier by "poisoning" its training data with carefully designed attacks. Bagging is a well-known ensemble construction...
Uploaded on: February 14, 2024 -
2015 (v1)Publication
We present PharmaGuard, a novel system for the automatic discovery of illegal online pharmacies, aimed at assisting law-enforcement toward their early identification, blacklisting and shutdown. Given a previously labelled set of examples, the system is able to learn a profile of (illegal) pharmacies, and then exploit it to discover...
Uploaded on: May 13, 2023 -
2014 (v1)Publication
Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems. However, the suitability of clustering algorithms for security-sensitive settings has been recently questioned by showing that they can be...
Uploaded on: May 13, 2023 -
2013 (v1)Publication
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present a simple but effective...
Uploaded on: May 13, 2023 -
2015 (v1)Publication
Pattern classifiers have been widely used in adversarial settings like spam and malware detection, although they have not been originally designed to cope with intelligent attackers that manipulate data at test time to evade detection. While a number of adversary-aware learning algorithms have been proposed, they are computationally...
Uploaded on: April 14, 2023 -
2014 (v1)Publication
Support vector machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning...
Uploaded on: May 13, 2023