Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Author "Yazidi, Anis"
Now showing items 1-5 of 5
-
A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
Aryan, Ramtin; Yazidi, Anis; Engelstad, Paal E.; Kure, Øivind (Chapter, 2017)SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ... -
Enhancing security attacks analysis using regularized machine learning techniques
Hagos, Desta Haileselassie; Yazidi, Anis; Kure, Øivind; Engelstad, Paal E. (Journal article; Peer reviewed, 2017)With the increasing threats of security attacks, Machine learning (ML) has become a popular technique to detect those attacks. However, most of the ML approaches are black-box methods and their inner-workings are difficult ... -
Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations
Fladby, Torgeir; Haugerud, Hårek; Nichele, Stefano; Begnum, Kyrre; Yazidi, Anis (Chapter, 2020)Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known ... -
General TCP state inference model from passive measurements using machine learning techniques
Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (Journal article; Peer reviewed, 2018)Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ... -
Recovering Request Patterns to a CPU Processor from Observed CPU Consumption Data
Hammer, Hugo Lewi; Yazidi, Anis; Bratterud, Alfred; Haugerud, Hårek; Feng, Boning (Chapter, 2016)Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes ...