Молимо вас користите овај идентификатор за цитирање или овај линк до ове ставке:
                
    
    https://scidar.kg.ac.rs/handle/123456789/22646| Назив: | Can Support Vectors Detect Exploits? | 
| Аутори: | Maček, Nemanja    Franc, Igor       Gnjatović, Milan Trenkić, Branimir Bogdanoski, Mitko Aleksić, Aca  | 
| Датум издавања: | 2018 | 
| Сажетак: | An exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer system, unauthorized privilege escalation, or a denial-of-service attack. Although anti-malware products and signature-based intrusion detection systems provide reasonable level of security, they will not detect and prevent execution of new exploits or exploits that tend to evolve, as there is no signature in the anti-malware or intrusion detection database. To raise the overall level of security we have introduced one kernel-based machine learning method, named support vector machines, into an intrusion detection system that is capable of detecting exploits without employing signature database. Experimental evaluation of our solution is conducted on the custom dataset generated in isolated environment. | 
| URI: | https://scidar.kg.ac.rs/handle/123456789/22646 | 
| Тип: | conferenceObject | 
| Налази се у колекцијама: | Faculty of Mechanical and Civil Engineering, Kraljevo | 
Датотеке у овој ставци:
| Датотека | Опис | Величина | Формат | |
|---|---|---|---|---|
| Can support vectors learn exploits.pdf | 126.29 kB | Adobe PDF | ![]() Погледајте  | 
Ставке на SCIDAR-у су заштићене ауторским правима, са свим правима задржаним, осим ако није другачије назначено.
            
  

