Publication | Closed Access
Black Box Attacks on Deep Anomaly Detectors
56
Citations
33
References
2019
Year
Unknown Venue
Hardware SecurityAnomaly DetectionMachine LearningData ScienceEngineeringIntrusion Detection SystemThreat DetectionAdversarial Machine LearningNovelty DetectionTrue AnomaliesComputer ScienceDeep Anomaly DetectorsDeep Learning
The process of identifying the true anomalies from a given set of data instances is known as anomaly detection. It has been applied to address a diverse set of problems in multiple application domains including cybersecurity. Deep learning has recently demonstrated state-of-the-art performance on key anomaly detection applications, such as intrusion detection, Denial of Service (DoS) attack detection, security log analysis, and malware detection. Despite the great successes achieved by neural network architectures, models with very low test error have been shown to be consistently vulnerable to small, adversarially chosen perturbations of the input. The existence of evasion attacks during the test phase of machine learning algorithms represents a significant challenge to both their deployment and understanding.
| Year | Citations | |
|---|---|---|
Page 1
Page 1