Published December 29, 2019 | Version v1
Journal article Open

Machine Learning confronted with the operational constraints of detection systems

  • 1. Vardhaman College of Engineering
  • 2. Universidade Federal de São Carlos

Description

Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal of machine learning techniques. While the results presented in academic research articles are often excellent, security experts still have many reservations about the use of Machine Learning in intrusion detection systems. They generally fear an inadequacy of these techniques to operational constraints, in particular because of a high level of expertise required, or a large number of false positives. In this article, we show that Machine Learning can be compatible with the operational constraints of detection systems. We explain how to build a detection model and present good practices to validate it before it goes into production. The methodology is illustrated by a case study on the detection of malicious PDF files and we offer a free tool, SecuML, to implement it.

Files

6-Article Text-14-1-10-20200518.pdf

Files (238.0 kB)

Name Size Download all
md5:c592d7825a1ee2dab8049984ad01ad52
238.0 kB Preview Download

Additional details

Related works

Is cited by
10.52502/ijitas.v1i1.6 (DOI)