FIELD: computer equipment.
SUBSTANCE: in the method of generating contentious examples for a network intrusion detection system, before testing in a real industrial system, a matrix of directions for dependence of features in the generated feature space is further constructed, then for each feature of the found contentious example, the value of which in the initial example has been changed, checking its dependent features determined in the feature dependency matrix, whether the direction of change of these dependent features corresponds to the correct direction given in the dependency directions matrix, and proceeding with testing according to the result or not accepting as an effective contentious example.
EFFECT: high speed of searching for efficient contentious examples.
1 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF GENERATING ADVERSARIAL EXAMPLES FOR NETWORK INTRUSION DETECTION SYSTEM | 2023 |
|
RU2823895C1 |
METHOD FOR GENERATING ADVERSARIAL EXAMPLES FOR INTRUSION DETECTION SYSTEM OF INDUSTRIAL CONTROL SYSTEM | 2022 |
|
RU2805014C1 |
SYSTEM AND METHOD FOR ANALYSING INCOMING TRAFFIC FLOW | 2023 |
|
RU2812087C1 |
METHOD OF GENERATING A UNIVERSAL INPUT SIGNAL FOR NEURON NETWORK INTRUSION DETECTOR IN INTER-MACHINE NETWORKS | 2018 |
|
RU2702274C1 |
PROTECTION METHOD OF VEHICLE CONTROL SYSTEMS AGAINST INTRUSIONS | 2019 |
|
RU2737229C1 |
METHOD FOR DETECTING REMOTE ATTACKS AGAINST AUTOMATIZED CONTROL SYSTEMS | 2004 |
|
RU2264649C1 |
METHOD FOR TRACKING, DETECTION AND IDENTIFICATION OF OBJECTS OF INTEREST AND AUTONOMOUS DEVICE WITH PROTECTION FROM COPYING AND HACKING FOR THEIR IMPLEMENTATION | 2021 |
|
RU2789609C1 |
METHOD FOR DETECTING REMOTE ATTACKS AGAINST AUTOMATED SYSTEMS | 2006 |
|
RU2321052C2 |
METHOD OF PROTECTING AN INFORMATION NETWORK FROM INTRUSIONS | 2019 |
|
RU2705773C1 |
METHOD FOR DETECTING ANOMALIES IN OPERATION OF AUTOMATED SYSTEM NETWORK | 2020 |
|
RU2738460C1 |
Authors
Dates
2025-05-05—Published
2024-11-01—Filed