Ensemble based collaborative and distributed intrusion detection systems: A survey

G Folino, P Sabatino - Journal of Network and Computer Applications, 2016 - Elsevier
Modern network intrusion detection systems must be able to handle large and fast changing
data, often also taking into account real-time requirements. Ensemble-based data mining …

Pattern recognition systems under attack: Design issues and research challenges

B Biggio, G Fumera, F Roli - International Journal of Pattern …, 2014 - World Scientific
We analyze the problem of designing pattern recognition systems in adversarial settings,
under an engineering viewpoint, motivated by their increasing exploitation in security …

Poisoning behavioral malware clustering

B Biggio, K Rieck, D Ariu, C Wressnegger… - Proceedings of the …, 2014 - dl.acm.org
Clustering algorithms have become a popular tool in computer security to analyze the
behavior of malware variants, identify novel malware families, and generate signatures for …

Is data clustering in adversarial settings secure?

B Biggio, I Pillai, S Rota Bulò, D Ariu, M Pelillo… - Proceedings of the 2013 …, 2013 - dl.acm.org
Clustering algorithms have been increasingly adopted in security applications to spot
dangerous or illicit activities. However, they have not been originally devised to deal with …

{ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates

T Nelms, R Perdisci, M Ahamad - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper, we present ExecScent, a novel system that aims to mine new, previously
unknown C&C domain names from live enterprise network traffic. ExecScent automatically …

On the use of artificial malicious patterns for android malware detection

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2020 - Elsevier
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …

Large-scale identification of malicious singleton files

B Li, K Roundy, C Gates, Y Vorobeychik - Proceedings of the seventh …, 2017 - dl.acm.org
We study a dataset of billions of program binary files that appeared on 100 million
computers over the course of 12 months, discovering that 94% of these files were present on …

Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting

R Bortolameotti, T van Ede, M Caselli… - Proceedings of the 33rd …, 2017 - dl.acm.org
We present DECANTeR, a system to detect anomalous outbound HTTP communication,
which passively extracts fingerprints for each application running on a monitored host. The …

Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network

M Sheikhan, Z Jadidi - Neural Computing and Applications, 2014 - Springer
Ever growing Internet causes the availability of information. However, it also provides a
suitable space for malicious activities, so security is crucial in this virtual environment. The …

Poisoning complete-linkage hierarchical clustering

B Biggio, SR Bulò, I Pillai, M Mura… - Structural, Syntactic, and …, 2014 - Springer
Clustering algorithms are largely adopted in security applications as a vehicle to detect
malicious activities, although few attention has been paid on preventing deliberate attacks …