A review of Machine Learning-based zero-day attack detection: Challenges and future directions

Y Guo - Computer communications, 2023 - Elsevier
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by
cybersecurity detection tools. The studies (Bilge and Dumitraş, 2012, Google, 0000 …

Hybrid-based analysis impact on ransomware detection for Android systems

R Almohaini, I Almomani, A AlKhayer - Applied Sciences, 2021 - mdpi.com
Android ransomware is one of the most threatening attacks that is increasing at an alarming
rate. Ransomware attacks usually target Android users by either locking their devices or …

Clustering-Based Intrusion Detection System Meets Multi-Critics Generative Adversarial Networks

H Wang, F Kandah, T Mendis… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Network security has continuously been a major focus of research and concern on a global
scale. The Intrusion Detection System (IDS), as a crucial defensive measure against network …

Toward the detection of polyglot files

L Koch, S Oesch, A Chaulagain, M Adkisson… - Proceedings of the 15th …, 2022 - dl.acm.org
Standardized file types play a key role in the development and use of computer software.
However, it is possible to confound standardized file type processing by creating a file that is …

Cryptocurrency mining malware detection based on behavior pattern and graph neural network

R Zheng, Q Wang, J He, J Fu, G Suri… - Security and …, 2022 - Wiley Online Library
Miner malware has been steadily increasing in recent years as the value of cryptocurrency
rises, which poses a considerable threat to users' device security. Miner malware has …

On the Abuse and Detection of Polyglot Files

L Koch, S Oesch, A Chaulagain, J Dixon… - arxiv preprint arxiv …, 2024 - arxiv.org
A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for
malware detection systems that route files to format-specific detectors/signatures, as well as …

Revolutionizing Cybersecurity: The GPT-2 Enhanced Attack Detection and Defense (GEADD) Method for Zero-Day Threats

R Jones, M Omar - … Journal of Informatics, Information System and …, 2024 - ojs.unikom.ac.id
The escalating sophistication of cyber threats, particularly zero-day attacks, necessitates
advanced detection methodologies in cybersecurity. This study introduces the GPT-2 …

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

RA Bridges, B Weber, JM Beaver… - … Conference on Big …, 2023 - ieeexplore.ieee.org
This work presents an evaluation of six prominent commercial endpoint malware detectors,
a network malware detector, and a file-conviction algorithm from a cyber technology vendor …

What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity

E Begoli, RA Bridges, S Oesch, KE Knight - arxiv preprint arxiv …, 2021 - arxiv.org
Policy-mandated, rigorously administered scientific testing is needed to provide
transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools …

Fortifying Network Security with Machine Learning

A Yanguema - Available at SSRN 4663593, 2023 - papers.ssrn.com
The pervasive integration of machine learning in various domains has positioned it at the
forefront of technological advancements, with cybersecurity being a significant beneficiary …