As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defenses escalate as well. Supervised classifiers are prone to adversarial evasion, and existing countermeasures suffer from many limitations. Most solutions degrade performance in the absence of adversarial perturbations; they are unable to face novel attack variants; they are applicable only to specific machine learning algorithms. We propose the first framework that can protect botnet detectors from adversarial attacks through deep reinforcement learning mechanisms. It automatically generates realistic attack samples that can evade detection, and it uses these samples to produce an augmented training set for producing hardened detectors. In such...
As the internet continues to be populated with new devices and emerging technologies, the attack sur...
Machine Learning (ML) has proven to be effective in many application domains. However, ML methods ca...
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasu...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Machine learning algorithms are effective in several applications, but they are not as much successf...
Botnet detectors based on machine learning are potential targets for adversarial evasion attacks. Se...
Machine learning is increasingly adopted for a wide array of applications, due to its promising resu...
Adversarial attacks represent a critical issue that prevents the reliable integration of machine lea...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Web bots are vital for the web as they can be used to automate several actions, some of which would ...
Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion...
As the internet continues to be populated with new devices and emerging technologies, the attack sur...
Machine Learning (ML) has proven to be effective in many application domains. However, ML methods ca...
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasu...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Machine learning algorithms are effective in several applications, but they are not as much successf...
Botnet detectors based on machine learning are potential targets for adversarial evasion attacks. Se...
Machine learning is increasingly adopted for a wide array of applications, due to its promising resu...
Adversarial attacks represent a critical issue that prevents the reliable integration of machine lea...
Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, atta...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Web bots are vital for the web as they can be used to automate several actions, some of which would ...
Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion...
As the internet continues to be populated with new devices and emerging technologies, the attack sur...
Machine Learning (ML) has proven to be effective in many application domains. However, ML methods ca...
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasu...