Молимо вас користите овај идентификатор за цитирање или овај линк до ове ставке: https://scidar.kg.ac.rs/handle/123456789/22646
Назив: Can Support Vectors Detect Exploits?
Аутори: Maček, Nemanja
Franc, Igor
Gnjatović, Milan
Trenkić, Branimir
Bogdanoski, Mitko
Aleksić, Aca
Датум издавања: 2018
Сажетак: An exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer system, unauthorized privilege escalation, or a denial-of-service attack. Although anti-malware products and signature-based intrusion detection systems provide reasonable level of security, they will not detect and prevent execution of new exploits or exploits that tend to evolve, as there is no signature in the anti-malware or intrusion detection database. To raise the overall level of security we have introduced one kernel-based machine learning method, named support vector machines, into an intrusion detection system that is capable of detecting exploits without employing signature database. Experimental evaluation of our solution is conducted on the custom dataset generated in isolated environment.
URI: https://scidar.kg.ac.rs/handle/123456789/22646
Тип: conferenceObject
Налази се у колекцијама:Faculty of Mechanical and Civil Engineering, Kraljevo

Број прегледа

14

Број преузимања

1

Датотеке у овој ставци:
Датотека Опис ВеличинаФормат 
Can support vectors learn exploits.pdf126.29 kBAdobe PDFСличица
Погледајте


Ставке на SCIDAR-у су заштићене ауторским правима, са свим правима задржаним, осим ако није другачије назначено.