Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Modeling realistic adversarial attacks against network intrusion detection systems

G Apruzzese, M Andreolini, L Ferretti… - … Threats: Research and …, 2022 - dl.acm.org
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …

Insomnia: Towards concept-drift robustness in network intrusion detection

G Andresini, F Pendlebury, F Pierazzi… - Proceedings of the 14th …, 2021 - dl.acm.org
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …

Sok: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Survivable zero trust for cloud computing environments

L Ferretti, F Magnanini, M Andreolini, M Colajanni - Computers & Security, 2021 - Elsevier
The security model relying on the traditional defense of the perimeter cannot protect modern
dynamic organizations. The emerging paradigm called zero trust proposes a modern …

Addressing adversarial attacks against security systems based on machine learning

G Apruzzese, M Colajanni, L Ferretti… - … conference on cyber …, 2019 - ieeexplore.ieee.org
Machine-learning solutions are successfully adopted in multiple contexts but the application
of these techniques to the cyber security domain is complex and still immature. Among the …

A systematic map** study on intrusion alert analysis in intrusion detection systems

AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …

Evading botnet detectors based on flows and random forest with adversarial samples

G Apruzzese, M Colajanni - 2018 IEEE 17th International …, 2018 - ieeexplore.ieee.org
Machine learning is increasingly adopted for a wide array of applications, due to its
promising results and autonomous capabilities. However, recent research efforts have …