Please use this identifier to cite or link to this item: https://scidar.kg.ac.rs/handle/123456789/22646
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMaček, Nemanja-
dc.contributor.authorFranc, Igor-
dc.contributor.authorGnjatović, Milan-
dc.contributor.authorTrenkić, Branimir-
dc.contributor.authorBogdanoski, Mitko-
dc.contributor.authorAleksić, Aca-
dc.date.accessioned2025-11-03T11:07:14Z-
dc.date.available2025-11-03T11:07:14Z-
dc.date.issued2018-
dc.identifier.isbn978-86-89755-17-6en_US
dc.identifier.urihttps://scidar.kg.ac.rs/handle/123456789/22646-
dc.description.abstractAn exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer system, unauthorized privilege escalation, or a denial-of-service attack. Although anti-malware products and signature-based intrusion detection systems provide reasonable level of security, they will not detect and prevent execution of new exploits or exploits that tend to evolve, as there is no signature in the anti-malware or intrusion detection database. To raise the overall level of security we have introduced one kernel-based machine learning method, named support vector machines, into an intrusion detection system that is capable of detecting exploits without employing signature database. Experimental evaluation of our solution is conducted on the custom dataset generated in isolated environment.en_US
dc.language.isoenen_US
dc.publisherBelgrade Metropolitan Universityen_US
dc.subjectExploitsen_US
dc.subjectMachine learningen_US
dc.subjectSupport Vector Machinesen_US
dc.titleCan Support Vectors Detect Exploits?en_US
dc.typeconferenceObjecten_US
dc.description.versionPublisheden_US
dc.type.versionPublishedVersionen_US
dc.source.conferenceThe 10th International Conference on Business Information Security (BISEC-2018), 20th October 2018, Belgrade, Serbiaen_US
Appears in Collections:Faculty of Mechanical and Civil Engineering, Kraljevo

Page views(s)

14

Downloads(s)

1

Files in This Item:
File Description SizeFormat 
Can support vectors learn exploits.pdf126.29 kBAdobe PDFThumbnail
View/Open


Items in SCIDAR are protected by copyright, with all rights reserved, unless otherwise indicated.