MLSEC 6 Flashcards
Classification for intrusion detection
Discrimination between benign events and attacks
Sources for attack data
Honeypot systems
Forensic analysis
Security Community
Classification using a perceptron rule
Learning by iterative updates of weight vector w
- Pick xi from training data and compute f(xi)
- If xi correctly classified ➝ do nothing
- If xi incorrectly classified ➝ w = w + y(xi)
Two-class SVM
Hyperplane separating data with maximum margin
Regularization by softening of the hyperplane
Support for learning and training using kernels only
margin SVM
m = 2 / ||w||
Poisoning of learning
Careful injection of malicious or benign data
Mimicry during detection
Adaption of attacks to mimic normal activity
Red herring during detection
Denial-of-service with bogus malicious activity
Drebin
detect and protect against malicious software (malware) on Android devices
Zoe
Protection in Industrial Control Systems
Stateful Anomaly Detection
Protocol-Agnostic Analysis