101 Hits in 8.3 sec

A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions [article]

Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult
2016 arXiv   pre-print
We present a formalized adaptive open world framework for stealth malware recognition and relate it mathematically to research from other machine learning domains.  ...  In this paper, we survey malicious stealth technologies as well as existing solutions for detecting and categorizing these countermeasures autonomously.  ...  We, therefore, felt the need to provide the first academic survey specifically focused on malicious stealth technologies and mitigation measures.  ... 
arXiv:1603.06028v2 fatcat:dyyemahzjze6bltxlwnnqgeyzy

The Threat of Offensive AI to Organizations [article]

Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio
2021 arXiv   pre-print
In this survey, we explore the threat of offensive AI on organizations.  ...  Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.  ...  Pin-Yu Chen, Evan Downing, and Didier Contis for taking the time to participate in our survey.  ... 
arXiv:2106.15764v1 fatcat:zkfukg4krjcczpie2gbdznwqqi

Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0 [article]

Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca
2019 arXiv   pre-print
Enemy software cyber agents - malware - will infiltrate friendly networks and attack friendly command, control, communications, computers, intelligence, surveillance, and reconnaissance and computerized  ...  This report presents the concept and architecture of an Autonomous Intelligent Cyber-defense Agent (AICA).  ...  E.1.3 Malware Deception Playbook: Toward Real-time Autonomous Deception of Malware We are developing an Autonomous Malware-centric Deception System (AMDS) as shown in Fig. E-1 .  ... 
arXiv:1803.10664v2 fatcat:gtkwxl2gezcn7hbdtldxh77zai

Artificial Intelligence in the Cyber Domain: Offense and Defense

Thanh Cong Truong, Quoc Bao Diep, Ivan Zelinka
2020 Symmetry  
This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.  ...  In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack.  ...  For instance, the adversarial attack against the AI models or the emergence of autonomous intelligent malware. Hence, research on discovering solutions to these threats should be further explored.  ... 
doi:10.3390/sym12030410 fatcat:7gyse3gaxjguhgkvfnbi7knkf4

Machine Learning in IoT Security: Current Solutions and Future Challenges [article]

Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain
2019 arXiv   pre-print
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives.  ...  In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks.  ...  [139] outlined in detail, the stealth malware and its mitigation techniques.  ... 
arXiv:1904.05735v1 fatcat:k5v6zad7lfhdrjngjmxgroafz4

CAVs Cybersecurity threats digest and analysis

S. Steinhorst, J. Lauinger, N.A. Nijdam, A. Collen, A. Zacharaki, M. Aslam
2019 Zenodo  
research relating to the particular topic of cybersecurity in CAVs, autonomous vehicles, and smart-city infrastructures.Moreover, the limitations of state-of-the-art cybersecurity systems and the constantly  ...  Within the first task a systematic analysis of the cybersecurity landscape will be performed with a focus on digital security of CAVs.  ...  The recovery toolkit takes recovery measures in case of an intrusion or real-world attack.  ... 
doi:10.5281/zenodo.4728214 fatcat:fonojcfo6fdzbnc7oz6w66zoh4

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf
2011 2011 IEEE Symposium on Security and Privacy  
This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler.  ...  For example, the number of mobile phones using a full blown OS has risen to nearly 200% from Q3/2009 to Q3/2010. As a result, mobile security is no longer immanent, but imperative.  ...  Acknowledgments: This work has been supported by the Ministry of Economic Affairs and Energy of the State of North Rhine-Westphalia (grant 315-43-02/2-005-WFBO-009), the Federal Ministry of Education and  ... 
doi:10.1109/sp.2011.29 dblp:conf/sp/BecherFHHUW11 fatcat:xdaljlq77jeyheahgxysam2inm

Davis Mirilla Dissertation on Impact Task Disengagement in Cyber Security.pdf

Davis Mirilla
2019 Figshare  
This study investigates the effects of Task Disengagement among SOC Analysts, triggered by the stressful workplace of a typical SOC environment.  ...  This has been successful because of improved efficiency and convenience to both organizations and general humanity.  ...  ACKNOWLEDGEMENTS In completing this work, I want to acknowledge the support I enjoyed from members of Faculty, Seidenberg College in Pace University, members of my family, my employers and a small but  ... 
doi:10.6084/m9.figshare.9785363.v1 fatcat:po66obagnjb6jgnqaso65hybw4

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)

Bjorn De Sutter, Christian Collberg, Mila Dalla Preda, Michael Wagner
2019 Dagstuhl Reports  
attacks: They control the devices and environments and use a range of tools to inspect, analyze, and alter software and its assets.  ...  The major outcomes are a structure for a white-paper on software protection evaluation methodologies, with some concrete input collected on the basis of four case studies explored during the seminar, and  ...  We also discuss the relation between attacker effort of individual steps of an attack path and features such as potency and resilience. A (unified) measure theory for potency?  ... 
doi:10.4230/dagrep.9.8.1 dblp:journals/dagstuhl-reports/SutterCPW19 fatcat:guwem6swfjf3hm4qaqcfkc6phi

A Survey on Security for Mobile Devices

Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra
2013 IEEE Communications Surveys and Tutorials  
As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers.  ...  This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications.  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper.  ... 
doi:10.1109/surv.2012.013012.00028 fatcat:us2g2qlglrflporo6fp6vqbdn4

Machine Learning Threatens 5G Security

Jani Suomalainen, Arto Juhola, Shahriar Shahabuddin, Aarne Mammela, Ijaz Ahmad
2020 IEEE Access  
We provide a broad survey on ML induced security threats and solutions in the scope of 5G networks.  ...  defenders are using and use it for stealth testing and rehearsing attacks.  ...  He is a co-author of more than 30 scientific publications on network security.  ... 
doi:10.1109/access.2020.3031966 fatcat:pnu4pm6f7rhqhgmw4juaxh6a5u

A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far

Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, 'Shade Kuyoro
2019 Information  
of botnets, botnet attack modes and control architectures, existing countermeasure solutions and limitations, as well as the prospects of a botnet threat.  ...  As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate  ...  Acknowledgments: The inputs of the three expert peer reviewers, as well as journal editors, and colleagues, which helped to enhance the quality of this research, are acknowledged and highly appreciated  ... 
doi:10.3390/info10110337 fatcat:bz6imitidfhspft3e5n3phcssa

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, Rahim Tafazolli
2022 IEEE Access  
However, despite these algorithms' high accuracy and reliability, ML systems are also vulnerable to a group of malicious activities called adversarial ML (AML) attacks.  ...  Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of energy and information between customers and suppliers.  ...  All in all, we aim to open a door toward a much more reliable network and raise the system's capability in terms of detecting and mitigating possible threats against the SG system. III.  ... 
doi:10.1109/access.2022.3174259 fatcat:txuebjhpnre73cq5lbx77ugmhq

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2022 arXiv   pre-print
This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them.  ...  The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics.  ...  Static Malware Analysis MAIL, an intermediate language, tries to solve two of the challenges automation and native code, by providing a step towards automating and optimizing malware analysis and detection  ... 
arXiv:2207.01227v1 fatcat:vfx54hq3ejc7dlfestj6dkstpa

Attribution of Cyber Attacks on Industrial Control Systems

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith
2016 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement  ...  We highlight the critical differences between attribution in enterprise networks and attribution in industrial networks. In doing so we provide a roadmap for future research. A.  ...  This study also suggests there is merit in research into a methodology that encompasses both technical and non-technical techniques to form a probabilistic model of attribution.  ... 
doi:10.4108/eai.21-4-2016.151158 fatcat:vwx6gddunrcwhhou6gq5odc3wi
« Previous Showing results 1 — 15 out of 101 results