Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
As an essential network service, the Domain Name System (DNS) is widely abused by
attackers, making malicious domain detection a crucial task when combating cybercrimes …
attackers, making malicious domain detection a crucial task when combating cybercrimes …
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier
Phishing is one of the most popular cyberspace attacks. Phishing detection has been
integrated into mainstream browsers to provide online protection. The phishing detector of …
integrated into mainstream browsers to provide online protection. The phishing detector of …
CharBot: A simple and effective method for evading DGA classifiers
J Peck, C Nie, R Sivaguru, C Grumer, F Olumofin… - IEEE …, 2019 - ieeexplore.ieee.org
Domain generation algorithms (DGAs) are commonly leveraged by malware to create lists of
domain names, which can be used for command and control (C&C) purposes. Approaches …
domain names, which can be used for command and control (C&C) purposes. Approaches …
Efficient deep learning models for DGA domain detection
In recent years, cyberattacks using command and control (C&C) servers have significantly
increased. To hide their C&C servers, attackers often use a domain generation algorithm …
increased. To hide their C&C servers, attackers often use a domain generation algorithm …
Analyzing the real-world applicability of DGA classifiers
A Drichel, U Meyer, S Schüppen… - Proceedings of the 15th …, 2020 - dl.acm.org
Separating benign domains from domains generated by DGAs with the help of a binary
classifier is a well-studied problem for which promising performance results have been …
classifier is a well-studied problem for which promising performance results have been …
Inline detection of DGA domains using side information
Malware applications typically use a command and control (C&C) server to manage bots to
perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for …
perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for …
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects
H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This comprehensive review navigates the complex domain of Domain Generation
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …