Towards the detection of phishing attacks

AA Athulya, K Praveen - 2020 4th international conference on …, 2020 - ieeexplore.ieee.org
Phishing is an act of creating a website similar to a legitimate website with a motive of
stealing user's confidential information. Phishing fraud might be the most popular …

Key-recovery attacks on KIDS, a keyed anomaly detection system

JE Tapiador, A Orfila, A Ribagorda… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Most anomaly detection systems rely on machine learning algorithms to derive a model of
normality that is later used to detect suspicious events. Some works conducted over the last …

Automatic generation of HTTP intrusion signatures by selective identification of anomalies

P Garcia-Teodoro, JE Diaz-Verdejo, JE Tapiador… - Computers & …, 2015 - Elsevier
In this paper, we introduce a novel methodology to automatically generate HTTP intrusion
signatures for Network Intrusion Detection Systems (NIDS). Our approach relies on the use …

Defacement detection with passive adversaries

F Bergadano, F Carretto, F Cogno, D Ragno - Algorithms, 2019 - mdpi.com
A novel approach to defacement detection is proposed in this paper, addressing explicitly
the possible presence of a passive adversary. Defacement detection is an important security …

[HTML][HTML] Application Layer Protocol Identification Method Based on ResNet

Z Fang, X Gao, H Zhang, J Tang, Q Gao - Algorithms, 2025 - mdpi.com
Most network attacks occur at the application layer, where many application layer protocols
exist. These protocols have different structures and functionalities, posing feature extraction …

Randomized anagram revisited

S Pastrana, A Orfila, JE Tapiador… - Journal of Network and …, 2014 - Elsevier
When compared to signature-based Intrusion Detection Systems (IDS), anomaly detectors
present the potential advantage of detecting previously unseen attacks, which makes them …

Keyed learning: An adversarial learning framework—formalization, challenges, and anomaly detection applications

F Bergadano - ETRI Journal, 2019 - Wiley Online Library
We propose a general framework for keyed learning, where a secret key is used as an
additional input of an adversarial learning system. We also define models and formal …

Cryptography and multiplicative arithmetic functions

A Conci, T MacHenry - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
The security of information has become even more important with the increased use of the
internet, mobile communication and even social networking, all of which have intensified the …

Defacement response via keyed learning

F Bergadano, F Carretto, F Cogno… - 2017 8th International …, 2017 - ieeexplore.ieee.org
Defacement Response via Keyed Learning Page 1 Defacement Response via Keyed
Learning Francesco Bergadano, Fabio Carretto Department of Computer Science University of …

[PDF][PDF] Survey on keyed IDS and key recovery attacks

VM Lomte, D Patil - Int. J. Sci. Research, 2015 - academia.edu
With the anomaly detection systems, many approaches and techniques have been
developed to track novel attacks on the systems. Anomaly detection systems based on …