MLSEC 6 Flashcards

1
Q

Classification for intrusion detection

A

Discrimination between benign events and attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sources for attack data

A

Honeypot systems

Forensic analysis

Security Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Classification using a perceptron rule

A

Learning by iterative updates of weight vector w

  • Pick xi from training data and compute f(xi)
  • If xi correctly classified ➝ do nothing
  • If xi incorrectly classified ➝ w = w + y(xi)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two-class SVM

A

Hyperplane separating data with maximum margin

Regularization by softening of the hyperplane

Support for learning and training using kernels only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

margin SVM

A

m = 2 / ||w||

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Poisoning of learning

A

Careful injection of malicious or benign data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mimicry during detection

A

Adaption of attacks to mimic normal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Red herring during detection

A

Denial-of-service with bogus malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Drebin

A

detect and protect against malicious software (malware) on Android devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zoe

A

Protection in Industrial Control Systems

Stateful Anomaly Detection

Protocol-Agnostic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly