On the security of machine learning in malware c&c detection: A survey

J Gardiner, S Nagaraja - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
One of the main challenges in security today is defending against malware attacks. As
trends and anecdotal evidence show, preventing these attacks, regardless of their …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arXiv preprint arXiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

The dropper effect: Insights into malware distribution with downloader graph analytics

BJ Kwon, J Mondal, J Jang, L Bilge… - Proceedings of the 22nd …, 2015 - dl.acm.org
Malware remains an important security threat, as miscreants continue to deliver a variety of
malicious programs to hosts around the world. At the heart of all the malware delivery …

Resident evil: Understanding residential ip proxy as a dark service

X Mi, X Feng, X Liao, B Liu, XF Wang… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
An emerging Internet business is residential proxy (RESIP) as a service, in which a provider
utilizes the hosts within residential networks (in contrast to those running in a datacenter) to …

A lustrum of malware network communication: Evolution and insights

C Lever, P Kotzias, D Balzarotti… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Both the operational and academic security communities have used dynamic analysis
sandboxes to execute malware samples for roughly a decade. Network information derived …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Combating the evasion mechanisms of social bots

Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …

Scanning the internet for liveness

S Bano, P Richter, M Javed, S Sundaresan… - ACM SIGCOMM …, 2018 - dl.acm.org
Internet-wide scanning depends on a notion of liveness: does a target IP address respond to
a probe packet? However, the interpretation of such responses, or lack of them, is nuanced …

Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis

Z Xu, A Nappa, R Baykov, G Yang… - Proceedings of the 2014 …, 2014 - dl.acm.org
Malware continues to be one of the major threats to Internet security. In the battle against
cybercriminals, accurately identifying the underlying malicious server infrastructure (eg, C&C …