[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2020 - Google Patents

A feature-vector generative adversarial network for evading PDF malware classifiers

Li et al., 2020

Document ID
18430978004341394041
Author
Li Y
Wang Y
Wang Y
Ke L
Tan Y
Publication year
Publication venue
Information Sciences

External Links

Snippet

Abstract Cyber-Physical Systems (CPS) are increasingly utilizing machine learning (ML) algorithms to resolve different control and decision making problems. CPS are traditionally vulnerable to evasion attacks and adversarial examples, hence the integration of learning …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Li et al. A feature-vector generative adversarial network for evading PDF malware classifiers
Mao et al. Phishing page detection via learning classifiers from page layout feature
Tang et al. A survey of machine learning-based solutions for phishing website detection
Azeez et al. Windows PE malware detection using ensemble learning
Khan et al. Analysis of ResNet and GoogleNet models for malware detection
Kumar et al. Malicious code detection based on image processing using deep learning
Ha et al. Security and privacy issues in deep learning: a brief review
Li et al. I-mad: Interpretable malware detector using galaxy transformer
He et al. A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network
Meenakshi et al. A review on security attacks and protective strategies of machine learning
Singh et al. Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Wang et al. Advandmal: Adversarial training for android malware detection and family classification
Liu et al. FewM-HGCL: Few-shot malware variants detection via heterogeneous graph contrastive learning
Altoub et al. An ontological knowledge base of poisoning attacks on deep neural networks
Hu et al. Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism
Deng et al. MDHE: A malware detection system based on trust hybrid user-edge evaluation in IoT network
Gilliard et al. Knowledge graph reasoning for cyber attack detection
Zyout et al. Malware classification approaches utilizing binary and text encoding of permissions
Demirel et al. Web based anomaly detection using zero-shot learning with CNN
Fan et al. IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks
Smith et al. Mind the gap: On bridging the semantic gap between machine learning and information security
Qian et al. Channel Features and API Frequency-Based Transformer Model for Malware Identification
Toğaçar et al. Processing 2D barcode data with metaheuristic based CNN models and detection of malicious PDF files
Sahib et al. Proposed intelligence systems based on digital Forensics
Elattar et al. Explainable AI model for PDFMal detection based on gradient boosting model