Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(595.61KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Adversarial Attacks and Defenses in Intrusion Detection Systems: A Survey
Ilja Moisejevs
Pages - 44 - 62     |    Revised - 31-08-2019     |    Published - 01-10-2019
Volume - 8   Issue - 3    |    Publication Date - October 2019  Table of Contents
MORE INFORMATION
KEYWORDS
Machine Learning, Intrusion Detection Systems, Adversarial Attacks, Evasion Attacks, Poisoning Attacks.
ABSTRACT
The world is becoming more digitized and inter-connected by the day and securing our digital infrastructure is not a topic we can take lightly anymore. Intrusion detection systems (IDSs) have been an integral part of the cybersecurity stack ever since their introduction in the 1980s. Traditionally such systems have relied on signatures and heuristics, however, recently growing demand for scalability, advances in computational power, and increasing dataset availability, have paved the way for machine learning approaches.

The challenge is that even though machine learning can do a better job at detecting intrusions in normal conditions - it itself is left vulnerable to adaptive adversaries who understand how these systems work and "think". In this survey we review the different kinds of attacks such an adversary can mount on IDSs, and perhaps more importantly, the various defenses available for making IDSs more robust. We start by proving some historic context on the matter and introducing the basic taxonomy of adversarial machine learning, before diving into the methods, attacks and defenses in the second part of the write-up.
1 Google Scholar 
2 refSeek 
3 BibSonomy 
4 Scribd 
5 SlideShare 
1 "CrowdStrike Introduces Enhanced Endpoint Machine Learning Capabilities and Advanced Endpoint Protection Modules." Internet: https://www.crowdstrike.com/resources/news/crowdstrike-introduces-enhanced-endpoint-machine-learning-capabilities-and-advanced-endpoint-protection-modules/, Feb. 13, 2017 [Jul. 24, 2019].
2 M. Berninger and A. Sopan. "Reverse Engineering the Analyst: Building Machine Learning Models for the SOC." Internet: https://www.fireeye.com/blog/threat-research/2018/06/build- machine-learning-models-for-the-soc.html, Jun. 05, 2018 [Jul. 24, 2019].
3 "How does Symantec Endpoint Protection use advanced machine learning?" Internet: https://support.symantec.com/us/en/article.howto125816.html, Apr. 24, 2019 [Jul. 24, 2019].
4 "GuardDuty Intelligent Threat Detection AWS." Internet: https://aws.amazon.com/guardduty/, 2018 [Jul. 24, 2019].
5 R. Ronen. "Machine Learning in Azure Security Center." Internet: https://azure.microsoft.com/en-us/blog/machine-learning-in-azure-security-center/, Jan. 28, 2016 [Jul. 24, 2019].
6 "Machine Learning Analytics app." Internet: https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.8/com.ibm.UBAapp.doc/c_ Qapps_UBA_ML_intro.html, nd [Jul. 24, 2019].
7 "RSA NetWitness UEBA." Internet: https://www.rsa.com/content/dam/en/data-sheet/rsa- netwitness-ueba.pdf, 2018 [Jul. 24, 2019].
8 "SIEM - Security Information and Event Management." Internet: https://www.splunk.com/en_us/cyber-security/siem-security-information-and-event- management.html, nd [Jul. 24, 2019].
9 "Use Cases: Demisto's Top Machine Learning Use Cases - Part 1." Internet: https://blog.demisto.com/demistos-top-machine-learning-use- cases-part-1, Feb. 20, 2018 [Jul. 24, 2019].
10 "Artificial Intelligence for Smarter Cybersecurity." Internet: https://www.ibm.com/security/artificial-intelligence, nd [Jul. 24, 2019].
11 "Big Data Analytics for Advanced Security." Internet: https://logrhythm.com/solutions/security/security-analytics/, nd [Jul. 24, 2019].
12 "Cognito Detect is the most powerful way to find and stop cyberattackers in real time." Internet: https://content.vectra.ai/rs/748-MCE- 447/images/ProductCompanyOverview_2019_Cognito_Detect_AIpowered_attacker_detect ion_English.pdf, nd [Jul. 24, 2019].
13 H. Hindy, D. Brosset, E. Bayne, A. Seeam, C. Tachtatzis, R. Atkinson and X. Bellekens. (2018, Jun.). "A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets." arXiv Preprint - arXiv:1806.03517. [On-line]. Available: https://arxiv.org/abs/1806.03517 [Jul. 24, 2019].
14 B. Biggio, B. Nelson and P. Laskov. (2013, Mar.). "Poisoning Attacks against Support Vector Machines." arXiv Preprint - arXiv:1206.6389. [On-line]. Available: https://arxiv.org/abs/1206.6389 [Jul. 24, 2019].
15 B. Biggio, K. Rieck, D. Ariu, C. Wressnegger, I. Corona, G. Giacinto and F. Roli. "Poisoning Behavioral Malware Clustering," in Proc. AISec'14 - Workshop on Artificial Intelligent and Security Workshop, 2014, pp. 27-36.
16 C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow and R. Fergus. (2013, Dec.). "Intriguing properties of neural networks." arXiv Preprint - arXiv:1312.6199. [On-line]. Available: https://arxiv.org/abs/1312.6199 [Jul. 24, 2019].
17 I.J. Goodfellow, J. Shlens and C. Szegedy. (2014, Dec.). "Explaining and Harnessing Adversarial Examples." arXiv Preprint - arXiv:1412.6572. [On-line]. Available: https://arxiv.org/abs/1412.6572 [Jul. 24, 2019].
18 B. Nelson, M. Barreno, F.J. Chi, A.D. Joseph, B.I.P. Rubinstein, U. Saini, C. Sutton, J.D. Tygar and K. Xia. "Misleading Learners: Co-opting Your Spam Filter," in Machine Learning in Cyber Trust. Boston: Springer, 2009, pp. 17-51.
19 B.I.P. Rubinstein, B. Nelson, L. Huang, A.D. Joseph, S. Lau, S. Rao, N. Taft and J.D. Tygar. "ANTIDOTE: understanding and defending against poisoning of anomaly detectors," in Proc. IMC'09 - 9th ACM SIGCOMM conference on Internet Measurement, 2009, pp. 1-14.
20 F. Tramér, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh and P. McDaniel. (2017, May.). "Ensemble Adversarial Training: Attacks and Defenses." arXiv Preprint - arXiv:1705.07204. [On-line]. Available: https://arxiv.org/abs/1705.07204 [Jul. 24, 2019].
21 N. Papernot, P. McDaniel, X. Wu, S. Jha and A. Swami. (2015, Nov.). "Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks." arXiv Preprint - arXiv:1511.04508. [On-line]. Available: https://arxiv.org/abs/1511.04508 [Jul. 24, 2019].
22 F. Liao, M. Liang, Y. Dong, T. Pang, X. Hu and J. Zhu. (2017, Dec.). "Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser." arXiv Preprint - arXiv:1712.02976. [On-line]. Available: https://arxiv.org/abs/1712.0276 [Jul. 24, 2019].
23 N. Akhtar, J. Liu and A. Mian. "Defense against Universal Adversarial Perturbations," in Proc. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2018, pp. 3389-98.
24 H. Hosseini, Y. Chen, S. Kannan, B. Zhang and R. Poovendran. (2017, Mar.). "Blocking Transferability of Adversarial Examples in Black-Box Learning Systems." arXiv Preprint - arXiv:1703.04318. [On-line]. Available: https://arxiv.org/abs/1703.04318 [Jul. 24, 2019].
25 G. Katz, C. Barrett, D.L. Dill, K. Julian and M.J. Kochenderfer. "Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks," in Proc. CAV 2017 International Conference on Computer Aided Verification, 2017, pp. 97-117.
26 T. Hamed, J.B. Ernst and S.C. Kremer. "A Survey and Taxonomy of Classifiers of Intrusion Detection Systems," in Computer and Network Security Essentials. K. Daimi, Ed. Cham: Springer, 2018, pp. 21-39.
27 E. Hodo, X. Bellekens, A. Hamilton, C. Tachtatzis and R. Atkinson. (2017, Jan.). "Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey." arXiv Preprint - arXiv:1701.02145. [On-line]. Available: https://arxiv.org/abs/1701.02145 [Jul. 24, 2019].
28 P.R.K. Varma, V.V. Kumari and S.S. Kumar. "A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective," in Progress in Computing, Analytics and Networking. P.K. Pattnaik, S.S. Rautaray, H. Das and J. Nayak, Eds. Singapore: Springer, 2018, pp. 785-93.
29 T.N. Nguyen. (2018, Apr.). "The Challenges in SDN/ML Based Network Security : A Survey." arXiv Preprint - arXiv:1804.03539. [On-line]. Available: https://arxiv.org/abs/1804.03539 [Jul. 24, 2019].
30 J.P. Anderson. "Computer Security Threat Monitoring and Surveillance," in Technical Report: James P. Anderson Company. Fort Washington: James P. Anderson Company, 1980.
31 D.E. Denning. "An Intrusion Detection Model." IEEE transactions on Software Engineering, vol. SE-13(No 2), pp. 222-32, Feb. 1987.
32 S. Smaha. "Computer Misuse and Anomaly Detection." Internet: http://seclab.cs.ucdavis.edu/projects/cmad/4-1996/pdfs/Smaha.pdf, Nov. 1996 [Jul. 24, 2019].
33 H. Kvarnström. "A survey of commercial tools for intrusion detection," in Technical Report 99-8. Göteborg: Chalmers University of Technology, Oct. 1999.
34 P. Innella. "The Evolution of Intrusion Detection Systems." Internet: https://www.symantec.com/connect/articles/evolution-intrusion-detection-systems, Nov. 16, 2001 [Jul. 24, 2019].
35 M.V. Mahoney and P.K. Chan. "Learning nonstationary models of normal network traffic for detecting novel attacks," in Proc. KDD'02 - 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002, pp. 376-85.
36 "KDD Cup 1999 Data." Internet: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Oct. 28, 1999 [Jul. 29, 2019].
37 L. Dhanabal and S.P. Shantharajah. "A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms." International Journal of Advanced Research in Computer and Communication Engineering, vol. 4(6), pp. 442-56, Jun. 2015.
38 C. Kruegel, D. Mutz, F. Valeur and G. Vigna. "On the Detection of Anomalous System Call Arguments," in Proc. Computer Security - ESORICS 2003, 2003, pp. 326-43.
39 M.V. Mahoney and P.K. Chan. "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection," in Proc. RAID 2003: Recent Advances in Intrusion Detection, 2003, pp. 220-37.
40 W. Lee and S.J. Stolfo. "A framework for constructing features and models for intrusion detection systems." ACM Transactions on Information and System Security (TISSEC), vol. 3(4), pp. 227-61, Nov. 2000.
41 L.O. Anyanwu, J. Keengwe and G.A. Arome. "Scalable Intrusion Detection with Recurrent Neural Networks," in Proc. 7th International Conference on Information Technology: New Generations, 2010, pp. 919-23.
42 J. Kim, J. Kim, H.L.T. Thu and H. Kim. "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection," in Proc. 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1-5.
43 R. Sommer and V. Paxson. "Outside the Closed World: On Using Machine Learning For Network Intrusion Detection," in Proc. 2010 IEEE Symposium on Security and Privacy, 2010, pp. 305-16.
44 A. Summers and C. Tickner. "Introduction to security analysis." Internet: https://www.doc.ic.ac.uk/~ajs300/security/index.html, nd. [Jul. 24, 2019].
45 A. Chakraborty, M. Alam, V. Dey, A. Chattopadhyay and D. Mukhopadhyay. (2018, Sep.). "Adversarial Attacks and Defences: A Survey." arXiv Preprint - arXiv:1810.00069. [On-line]. Available: https://arxiv.org/abs/1810.00069 [Jul. 24, 2019].
46 N. Akhtar and A. Mian. (2018, Feb.). "Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey." IEEE Access. [On-line] 6, pp. 14410-30. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8294186 [Jul. 24, 2019].
47 N. Papernot, P.D. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik and A. Swami. "The Limitations of Deep Learning in Adversarial Settings," in Proc. 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016, pp. 372-87.
48 C. Song and V. Shmatikov. "Auditing Data Provenance in Text- Generation Models," in Proc. KDD'19 - 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019, pp. 196-206.
49 S. Truex, L. Liu, M.E. Gursoy, L. Yu and W. Wei. (2019, Feb.). "Demystifying Membership Inference Attacks in Machine Learning as a Service." IEEE Transactions on Services Computing. [On-line] Available: https://ieeexplore.ieee.org/document/8634878 [Jul. 24, 2019].
50 A. Pyrgelis, C. Troncoso and E. De Cristofaro. "Knock Knock, Who's There? Membership Inference on Aggregate Location Data," in Proc. NDSS 2018 - 25th Network and Distributed System Security Symposium, 2018.
51 L. Kleinrock. "Information Flow in Large Communication Nets." Proposal for Ph.D. Thesis. Cambridge: Massachusetts Institute of Technology, May. 1961.
52 M. Chung, N.J. Puketza, R.A. Olsson and B. Mukherjee. "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions," in Proc. 18th National Information Systems Security Conference, 1995, pp. 173-83.
53 V. Paxson. "Bro: A System for Detecting Network Intruders in Real-Time." Computer Networks, vol. 31(23-4), pp. 2435-63, Dec. 1999.
54 T.H. Ptacek and T.N. Newsham. "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection." Internet: https://pdfs.semanticscholar.org/fa48/7f1a3e173a8178502eae14a9f9b431eaf62a.pdf?_ga= 2.252024270.655035103.1568508389-933039622.1562710349, Jan. 1998 [Jul. 24, 2019].
55 M. Handley, V. Paxson and C. Kreibich. "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," in Proc. 10th USENIX Security Symposium, 2001.
56 D.A. Wagner and P. Soto. "Mimicry attacks on host-based intrusion detection systems," in Proc. CCS'02 - 9th ACM Conference on Computer and Communications Security, 2002, pp. 255-64.
57 K. Tan, J. McHugh and K. Killourhy. "Hiding Intrusions: From the Abnormal to the Normal and Beyond," in Proc. IH 2002: Information Hiding, 2002, pp. 1-17.
58 K.M.C. Tan, K.S. Killourhy and R.A. Maxion. "Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits," in Proc. RAID'02 - 5th international conference on Recent Advances in Intrusion Detection, 2002, pp. 54-73.
59 P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov and W. Lee. "Polymorphic Blending Attacks," in Proc. USENIX-SS'06 - 15th conference on USENIX Security Symposium, 2006.
60 S.J. Stolfo and K. Wang. "Network Payload-based Anomaly Detection and Content-based Alert Correlation." Doctoral Dissertation. New York: Columbia University, 2007.
61 O.M. Kolesnikov and W. Lee. "Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic." Internet: https://pdfs.semanticscholar.org/97d3/5f789529081a40131b1171a0bb6d6d069b9a.pdf?_g a=2.256374220.655035103.1568508389-933039622.1562710349, 2005.
62 P. Fogla and W. Lee. "Evading network anomaly detection systems: formal reasoning and practical techniques," in Proc. CCS'06 - 13th ACM Conference on Computer and Communications Security, 2006, pp. 59-68.
63 C. Huang, T. Lee, L. Chang, J. Lin and G. Horng. "Adversarial Attacks on SDN-Based Deep Learning IDS System," in Proc. ICMWT 2018: Mobile and Wireless Technology 2018, 2018, pp. 181-91.
64 M. Rigaki and A. Elragal. "Adversarial Deep Learning Against Intrusion Detection Classifiers," in Proc. ST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience, 2017.
65 J. Clements, Y. Yang, A. Sharma, H. Hu and Y. Lao. (2019, Mar.). "Rallying Adversarial Techniques against Deep Learning for Network Security." arXiv Preprint - arXiv:1903.11688. [On-line]. Available: https://arxiv.org/abs/1903.11688 [Jul. 24, 2019].
66 Z. Wang. (2018, Jul.). "Deep Learning-Based Intrusion Detection With Adversaries." IEEE Access. [On-line] 6, pp. 38367-84. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8408779&isnumber=8274985 [Jul. 24, 2019].
67 N. Carlini and D. Wagner. "Towards Evaluating the Robustness of Neural Networks," in Proc. 2017 IEEE Symposium on Security and Privacy, 2017, pp. 39-57.
68 P. Chen, Y. Sharma, H. Zhang, J. Yi and C. Hsieh. "EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples," in Proc. AAAI-18 - 32nd AAAI Conference on Artificial Intelligence, 2017, pp. 10-7.
69 A. Kurakin, I.J. Goodfellow and S. Bengio. "Adversarial Machine Learning at Scale," in Proc. ICLR 2017 - 5th International Conference on Learning Representations, 2017.
70 P. Panda and K. Roy. (2019, May.). "Implicit Generative Modeling of Random Noise during Training improves Adversarial Robustness," arXiv Preprint - arXiv:1807.02188. [On-line]. Available: https://arxiv.org/abs/1807.02188 [Jul. 24, 2019].
71 S. Moosavi-Dezfooli, A. Fawzi and P. Frossard. "DeepFool: a simple and accurate method to fool deep neural networks," in Proc. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 2574-82.
72 W. Brendel, J. Rauber and M. Bethge. "Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models," in Proc. 6th International Conference on Learning Representations (ICLR 2018), 2018.
73 J. Uesato, B. O'Donoghue, P. Kohli and A. van den Oord. (2018, Jun.). "Adversarial Risk and the Dangers of Evaluating Against Weak Attacks." arXiv Preprint - arXiv:1802.05666. [On-line]. Available: https://arxiv.org/abs/1802.05666 [Jul. 24, 2019].
74 P. Chen, H. Zhang, Y. Sharma, J. Yi and C. Hsieh. "ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models," in Proc. AISec'17 - 10th ACM Workshop on Artificial Intelligence and Security, 2017, pp. 15-26.
75 F. Tramèr, N. Papernot, I. Goodfellow, D. Boneh and P. McDaniel. (2017, May.). "The Space of Transferable Adversarial Examples." arXiv Preprint - ArXiv, abs/1704.03453. [On- line]. Available: https://arxiv.org/abs/1704.03453 [Jul. 24, 2019].
76 M. Rigaki and S. Garcia. "Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection," in Proc. 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 70-5.
77 S.P. Chung and A.K. Mok. "Allergy Attack Against Automatic Signature Generation," in Proc. RAID 2006: Recent Advances in Intrusion Detection, 2006, pp. 61-80.
78 B. Nelson and A.D. Joseph. "Bounding an Attack's Complexity for a Simple Learning Model." Internet: https://pdfs.semanticscholar.org/71d8/678edf41803a6c0827dc05f9906afb61 e454.pdf?_ga= 2.256875340.655035103.1568508389-933039622.1562710349, 2006 [Jul. 24, 2019].
79 B. Nelson, M. Barreno, F.J. Chi, A.D. Joseph, B.I.P. Rubinstein, U. Saini, C. Sutton, J.D. Tygar and K. Xia. "Exploiting Machine Learning to Subvert Your Spam Filter," in Proc. LEET'08 - 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008.
80 M. Kloft and P. Laskov. "Online Anomaly Detection under Adversarial Impact," in Proc. 13th International Conference on Artificial Intelligence and Statistics (AISTATS): PMLR 9, 2010, 405-12.
81 B. Biggio, G. Fumera and F. Roli. "Security Evaluation of Pattern Classifiers under Attack." IEEE Transactions on Knowledge and Data Engineering, vol. 26(4), pp. 984-96, 2014.
82 H. Kim and B. Karp. "Autograph: Toward Automated, Distributed Worm Signature Detection," in Proc. 13th USENIX Security Symposium, 2004, pp. 271-86.
83 P. Akritidis, E.P. Markatos, M. Polychronakis and K. Anagnostakis. "STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis," in Proc. SEC 2005: Security and Privacy in the Age of Ubiquitous Computing, 2005, pp. 375-91.
84 T. Toth and C. Krüegel. "Accurate Buffer Overflow Detection via Abstract Payload Execution," in Proc. RAID'02 - 5th international conference on Recent advances in intrusion detection, 2002, pp. 274- 91.
85 M. Roesch. "Snort: Lightweight Intrusion Detection for Networks," in Proc. LISA'99 - 13th USENIX conference on System administration, 2019, pp.229-38.
86 H. Zhang, X. Yu, P. Ren, C. Luo and G. Min. (2019, Jan.). "Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework." arXiv Preprint - ArXiv, abs/1901.07949. [On-line]. Available: https://arxiv.org/abs/1901.07949 [Jul. 24, 2019].
87 T. Na, J.H. Ko and S. Mukhopadhyay. "Cascade Adversarial Machine Learning Regularized with a Unified Embedding," in Proc. International Conference on Learning Representations (ICLR) 2018, 2018.
88 A. Madry, A. Makelov, L. Schmidt, D. Tsipras and A. Vladu. "Towards Deep Learning Models Resistant to Adversarial Attacks," in Proc. International Conference on Learning Representations (ICLR) 2018, 2018.
89 F. Farnia, J.M. Zhang and D. Tse. "Generalizable Adversarial Training via Spectral Normalization," in Proc. International Conference on Learning Representations (ICLR) 2019, 2019.
90 G.F. Cretu, A. Stavrou, M.E. Locasto, S.J. Stolfo and A.D. Keromytis. "Casting out Demons: Sanitizing Training Data for Anomaly Sensors," in Proc. SP '08 - 2008 IEEE Symposium on Security and Privacy, 2008, pp. 81-95.
91 S. Serneels and T. Verdonck. "Principal component analysis for data containing outliers and missing elements." Computational Statistics & Data Analysis, vol. 52(3), pp. 1712-27, 2008.
92 C. Croux, P. Filzmoser and M.R. Oliveira. "Algorithms for Projection-Pursuit Robust Principal Component Analysis." Chemometrics and Intelligent Laboratory Systems, vol. 87(2), pp. 218-25, 2007.
93 Z. Rustam and N. Olivera. "Comparison of fuzzy robust Kernel C-Means and support vector machines for intrusion detection systems using modified kernel nearest neighbor feature selection," in Proc. 3rd International Symposium on Current Progress in Mathematics and Sciences (ISCPMS 2017), 2017.
Mr. Ilja Moisejevs
Calypso AI - United Kingdom
umba3abp@gmail.com