Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

A survey of phishing attacks: Their types, vectors and technical approaches

KL Chiew, KSC Yong, CL Tan - Expert Systems with Applications, 2018 - Elsevier
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arxiv preprint arxiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

[PDF][PDF] Automatically evading classifiers

W Xu, Y Qi, D Evans - Proceedings of the 2016 network and distributed …, 2016 - inforsec.org
Machine learning is widely used to develop classifiers for security tasks. However, the
robustness of these methods against motivated adversaries is uncertain. In this work, we …

Poisoning attacks against support vector machines

B Biggio, B Nelson, P Laskov - arxiv preprint arxiv:1206.6389, 2012 - arxiv.org
We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such
attacks inject specially crafted training data that increases the SVM's test error. Central to the …

Cookieless monster: Exploring the ecosystem of web-based device fingerprinting

N Nikiforakis, A Kapravelos, W Joosen… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
The web has become an essential part of our society and is currently the main medium of
information delivery. Billions of users browse the web on a daily basis, and there are single …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

Machine learning techniques applied to cybersecurity

J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …

Tiresias: Predicting security events through deep learning

Y Shen, E Mariconti, PA Vervier… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …