Please use this identifier to cite or link to this item: https://scidar.kg.ac.rs/handle/123456789/22646
Title: Can Support Vectors Detect Exploits?
Authors: Maček, Nemanja
Franc, Igor
Gnjatović, Milan
Trenkić, Branimir
Bogdanoski, Mitko
Aleksić, Aca
Issue Date: 2018
Abstract: An exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer system, unauthorized privilege escalation, or a denial-of-service attack. Although anti-malware products and signature-based intrusion detection systems provide reasonable level of security, they will not detect and prevent execution of new exploits or exploits that tend to evolve, as there is no signature in the anti-malware or intrusion detection database. To raise the overall level of security we have introduced one kernel-based machine learning method, named support vector machines, into an intrusion detection system that is capable of detecting exploits without employing signature database. Experimental evaluation of our solution is conducted on the custom dataset generated in isolated environment.
URI: https://scidar.kg.ac.rs/handle/123456789/22646
Type: conferenceObject
Appears in Collections:Faculty of Mechanical and Civil Engineering, Kraljevo

Page views(s)

7

Downloads(s)

1

Files in This Item:
File SizeFormat 
Can support vectors learn exploits.pdf126.29 kBAdobe PDFView/Open


Items in SCIDAR are protected by copyright, with all rights reserved, unless otherwise indicated.