150 research outputs found

    Security Evaluation of Support Vector Machines in Adversarial Environments

    Full text link
    Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications

    Effectiveness evaluation of data mining based IDS

    Get PDF
    Proceeding of: 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 2006.Data mining has been widely applied to the problem of Intrusion Detection in computer networks. However, the misconception of the underlying problem has led to out of context results. This paper shows that factors such as the probability of intrusion and the costs of responding to detected intrusions must be taken into account in order to compare the effectiveness of machine learning algorithms over the intrusion detection domain. Furthermore, we show the advantages of combining different detection techniques. Results regarding the well known 1999 KDD dataset are shown.Publicad

    IDS Based on Bio-inspired Models

    Get PDF
    Unsupervised projection approaches can support Intrusion Detection Systems for computer network security. The involved technologies assist a network manager in detecting anomalies and potential threats by an intuitive display of the progression of network traffic. Projection methods operate as smart compression tools and map raw, high-dimensional traffic data into 2-D or 3-D spaces for subsequent graphical display. The paper compares three projection methods, namely, Cooperative Maximum Likelihood Hebbian Learning, Auto-Associative Back-Propagation networks and Principal Component Analysis. Empirical tests on anomalous situations related to the Simple Network Management Protocol (SNMP) confirm the validity of the projection-based approach. One of these anomalous situations (the SNMP community search) is faced by these projection models for the first time. This work also highlights the importance of the time-information dependence in the identification of anomalous situations in the case of the applied methods

    Inhibitor of Kappa B Epsilon (IκBε) Is a Non-Redundant Regulator of c-Rel-Dependent Gene Expression in Murine T and B Cells

    Get PDF
    Inhibitors of kappa B (IκBs) -α, -β and -ε effect selective regulation of specific nuclear factor of kappa B (NF-κB) dimers according to cell lineage, differentiation state or stimulus, in a manner that is not yet precisely defined. Lymphocyte antigen receptor ligation leads to degradation of all three IκBs but activation only of subsets of NF-κB-dependent genes, including those regulated by c-Rel, such as anti-apoptotic CD40 and BAFF-R on B cells, and interleukin-2 (IL-2) in T cells. We report that pre-culture of a mouse T cell line with tumour necrosis factor-α (TNF) inhibits IL-2 gene expression at the level of transcription through suppressive effects on NF-κB, AP-1 and NFAT transcription factor expression and function. Selective upregulation of IκBε and suppressed nuclear translocation of c-Rel were very marked in TNF-treated, compared to control cells, whether activated via T cell receptor (TCR) pathway or TNF receptor. IκBε associated with newly synthesised c-Rel in activated cells and, in contrast to IκBα and -β, showed enhanced association with p65/c-Rel in TNF-treated cells relative to controls. Studies in IκBε-deficient mice revealed that basal nuclear expression and nuclear translocation of c-Rel at early time-points of receptor ligation were higher in IκBε−/− T and B cells, compared to wild-type. IκBε−/− mice exhibited increased lymph node cellularity and enhanced basal thymidine incorporation by lymphoid cells ex vivo. IκBε−/− T cell blasts were primed for IL-2 expression, relative to wild-type. IκBε−/− splenic B cells showed enhanced survival ex vivo, compared to wild-type, and survival correlated with basal expression of CD40 and induced expression of CD40 and BAFF-R. Enhanced basal nuclear translocation of c-Rel, and upregulation of BAFF-R and CD40 occurred despite increased IκBα expression in IκBε−/− B cells. The data imply that regulation of these c-Rel-dependent lymphoid responses is a non-redundant function of IκBε
    corecore