Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
A survey of phishing attacks: Their types, vectors and technical approaches
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …
grown and evolved over the years as phishers are getting creative in planning and …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
[PDF][PDF] Automatically evading classifiers
Machine learning is widely used to develop classifiers for security tasks. However, the
robustness of these methods against motivated adversaries is uncertain. In this work, we …
robustness of these methods against motivated adversaries is uncertain. In this work, we …
Poisoning attacks against support vector machines
We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such
attacks inject specially crafted training data that increases the SVM's test error. Central to the …
attacks inject specially crafted training data that increases the SVM's test error. Central to the …
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
The web has become an essential part of our society and is currently the main medium of
information delivery. Billions of users browse the web on a daily basis, and there are single …
information delivery. Billions of users browse the web on a daily basis, and there are single …
Practical evasion of a learning-based classifier: A case study
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …
data. However, if they are deployed online, an attacker may attempt to evade them by …
Machine learning techniques applied to cybersecurity
J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …
linearity problems of different topics: prediction, classification, data association, data …
Tiresias: Predicting security events through deep learning
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …
only to detect malicious activity as it happens, but also to predict the specific steps that will …