We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet detectors against adversarial attacks. This dataset includes realistic adversarial samples that are generated by leveraging two widely used Deep Reinforcement Learning (DRL) techniques. These adversarial samples are proved to evade state of the art detectors based on Machine- and Deep-Learning algorithms. The initial corpus of malicious samples consists of network flows belonging to different botnet families presented in three public datasets containing real enterprise network traffic. We use these datasets to devise detectors capable of achieving state-of-the-art performance. We then train two DRL agents, based on Double Deep Q-Network and D...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
In this thesis we analyse test time adversarial examples for machine learning in security domains. F...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Botnet detectors based on machine learning are potential targets for adversarial evasion attacks. Se...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
In this project we investigate the susceptibility ofreinforcement rearning (RL) algorithms to advers...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
Adversarial attacks against conventional Deep Learning (DL) systems and algorithms have been widely ...
Deep learning methods are being increasingly widely used in static malware detection field because t...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
In this thesis we analyse test time adversarial examples for machine learning in security domains. F...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
Botnet detectors based on machine learning are potential targets for adversarial evasion attacks. Se...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirWilliam H. HsuSince the inception of D...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
In this project we investigate the susceptibility ofreinforcement rearning (RL) algorithms to advers...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
Adversarial attacks against conventional Deep Learning (DL) systems and algorithms have been widely ...
Deep learning methods are being increasingly widely used in static malware detection field because t...
Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different ...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
In this thesis we analyse test time adversarial examples for machine learning in security domains. F...