Li et al., 2020 - Google Patents
A feature-vector generative adversarial network for evading PDF malware classifiersLi et al., 2020
- Document ID
- 18430978004341394041
- Author
- Li Y
- Wang Y
- Wang Y
- Ke L
- Tan Y
- Publication year
- Publication venue
- Information Sciences
External Links
Snippet
Abstract Cyber-Physical Systems (CPS) are increasingly utilizing machine learning (ML) algorithms to resolve different control and decision making problems. CPS are traditionally vulnerable to evasion attacks and adversarial examples, hence the integration of learning …
- 206010014128 Echopraxia 0 abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | A feature-vector generative adversarial network for evading PDF malware classifiers | |
Mao et al. | Phishing page detection via learning classifiers from page layout feature | |
Tang et al. | A survey of machine learning-based solutions for phishing website detection | |
Azeez et al. | Windows PE malware detection using ensemble learning | |
Khan et al. | Analysis of ResNet and GoogleNet models for malware detection | |
Kumar et al. | Malicious code detection based on image processing using deep learning | |
Ha et al. | Security and privacy issues in deep learning: a brief review | |
Li et al. | I-mad: Interpretable malware detector using galaxy transformer | |
He et al. | A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network | |
Meenakshi et al. | A review on security attacks and protective strategies of machine learning | |
Singh et al. | Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system | |
Wang et al. | Advandmal: Adversarial training for android malware detection and family classification | |
Liu et al. | FewM-HGCL: Few-shot malware variants detection via heterogeneous graph contrastive learning | |
Altoub et al. | An ontological knowledge base of poisoning attacks on deep neural networks | |
Hu et al. | Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism | |
Deng et al. | MDHE: A malware detection system based on trust hybrid user-edge evaluation in IoT network | |
Gilliard et al. | Knowledge graph reasoning for cyber attack detection | |
Zyout et al. | Malware classification approaches utilizing binary and text encoding of permissions | |
Demirel et al. | Web based anomaly detection using zero-shot learning with CNN | |
Fan et al. | IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks | |
Smith et al. | Mind the gap: On bridging the semantic gap between machine learning and information security | |
Qian et al. | Channel Features and API Frequency-Based Transformer Model for Malware Identification | |
Toğaçar et al. | Processing 2D barcode data with metaheuristic based CNN models and detection of malicious PDF files | |
Sahib et al. | Proposed intelligence systems based on digital Forensics | |
Elattar et al. | Explainable AI model for PDFMal detection based on gradient boosting model |