The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

Adversarial defense: DGA-based botnets and DNS homographs detection through integrated deep learning

V Ravi, M Alazab, S Srinivasan… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cybercriminals use domain generation algorithms (DGAs) to prevent their servers from
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …

Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing

H Suryotrisongko, Y Musashi, A Tsuneda… - IEEE …, 2022 - ieeexplore.ieee.org
We investigated 12 years DNS query logs of our campus network and identified phenomena
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …

Replacedga: Bilstm based adversarial dga with high anti-detection ability

X Hu, H Chen, M Li, G Cheng, R Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Botnets extensively leverage Domain Generation Algorithms (DGAs) to establish reliable
communication channels between bots and Command and Control (C&C) servers …

Towards robust domain generation algorithm classification

A Drichel, M Meyer, U Meyer - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
In this work, we conduct a comprehensive study on the robustness of domain generation
algorithm (DGA) classifiers. We implement 32 white-box attacks, 19 of which are very …

Federated split learning model for industry 5.0: A data poisoning defense for edge computing

F Khan, RL Kumar, MH Abidi, S Kadry, H Alkhalefah… - Electronics, 2022 - mdpi.com
Industry 5.0 provides resource-efficient solutions compared to Industry 4.0. Edge Computing
(EC) allows data analysis on edge devices. Artificial intelligence (AI) has become the focus …

Multi-agent deep reinforcement learning-based partial task offloading and resource allocation in edge computing environment

H Ke, H Wang, H Sun - Electronics, 2022 - mdpi.com
In the dense data communication environment of 5G wireless networks, with the dramatic
increase in the amount of request computation tasks generated by intelligent wireless …

Detecting DGA-based botnets through effective phonics-based features

D Zhao, H Li, X Sun, Y Tang - Future Generation Computer Systems, 2023 - Elsevier
Botnets are machines that are increasingly controlled by cybercriminals to perform various
attacks. Traditional methods of defense, such as blocklisting, become ineffective because …

Adversarial robustness in hybrid quantum-classical deep learning for botnet dga detection

H Suryotrisongko, Y Musashi, A Tsuneda… - Journal of Information …, 2022 - jstage.jst.go.jp
This paper aims to contribute to the adversarial defense research gap in the current state-of-
the-art of adversarial machine learning (ML) attacks and defense. More specifically, it …