A review of Machine Learning-based zero-day attack detection: Challenges and future directions
Y Guo - Computer communications, 2023 - Elsevier
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by
cybersecurity detection tools. The studies (Bilge and Dumitraş, 2012, Google, 0000 …
cybersecurity detection tools. The studies (Bilge and Dumitraş, 2012, Google, 0000 …
Hybrid-based analysis impact on ransomware detection for Android systems
Android ransomware is one of the most threatening attacks that is increasing at an alarming
rate. Ransomware attacks usually target Android users by either locking their devices or …
rate. Ransomware attacks usually target Android users by either locking their devices or …
Clustering-Based Intrusion Detection System Meets Multi-Critics Generative Adversarial Networks
Network security has continuously been a major focus of research and concern on a global
scale. The Intrusion Detection System (IDS), as a crucial defensive measure against network …
scale. The Intrusion Detection System (IDS), as a crucial defensive measure against network …
Toward the detection of polyglot files
Standardized file types play a key role in the development and use of computer software.
However, it is possible to confound standardized file type processing by creating a file that is …
However, it is possible to confound standardized file type processing by creating a file that is …
Cryptocurrency mining malware detection based on behavior pattern and graph neural network
R Zheng, Q Wang, J He, J Fu, G Suri… - Security and …, 2022 - Wiley Online Library
Miner malware has been steadily increasing in recent years as the value of cryptocurrency
rises, which poses a considerable threat to users' device security. Miner malware has …
rises, which poses a considerable threat to users' device security. Miner malware has …
On the Abuse and Detection of Polyglot Files
A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for
malware detection systems that route files to format-specific detectors/signatures, as well as …
malware detection systems that route files to format-specific detectors/signatures, as well as …
Revolutionizing Cybersecurity: The GPT-2 Enhanced Attack Detection and Defense (GEADD) Method for Zero-Day Threats
The escalating sophistication of cyber threats, particularly zero-day attacks, necessitates
advanced detection methodologies in cybersecurity. This study introduces the GPT-2 …
advanced detection methodologies in cybersecurity. This study introduces the GPT-2 …
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors
This work presents an evaluation of six prominent commercial endpoint malware detectors,
a network malware detector, and a file-conviction algorithm from a cyber technology vendor …
a network malware detector, and a file-conviction algorithm from a cyber technology vendor …
What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity
Policy-mandated, rigorously administered scientific testing is needed to provide
transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools …
transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools …
Fortifying Network Security with Machine Learning
A Yanguema - Available at SSRN 4663593, 2023 - papers.ssrn.com
The pervasive integration of machine learning in various domains has positioned it at the
forefront of technological advancements, with cybersecurity being a significant beneficiary …
forefront of technological advancements, with cybersecurity being a significant beneficiary …