The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Defense strategies for adversarial machine learning: A survey
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
Adversarial defense: DGA-based botnets and DNS homographs detection through integrated deep learning
V Ravi, M Alazab, S Srinivasan… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cybercriminals use domain generation algorithms (DGAs) to prevent their servers from
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …
being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA …
Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing
H Suryotrisongko, Y Musashi, A Tsuneda… - IEEE …, 2022 - ieeexplore.ieee.org
We investigated 12 years DNS query logs of our campus network and identified phenomena
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …
Replacedga: Bilstm based adversarial dga with high anti-detection ability
X Hu, H Chen, M Li, G Cheng, R Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Botnets extensively leverage Domain Generation Algorithms (DGAs) to establish reliable
communication channels between bots and Command and Control (C&C) servers …
communication channels between bots and Command and Control (C&C) servers …
Towards robust domain generation algorithm classification
A Drichel, M Meyer, U Meyer - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
In this work, we conduct a comprehensive study on the robustness of domain generation
algorithm (DGA) classifiers. We implement 32 white-box attacks, 19 of which are very …
algorithm (DGA) classifiers. We implement 32 white-box attacks, 19 of which are very …
Federated split learning model for industry 5.0: A data poisoning defense for edge computing
Industry 5.0 provides resource-efficient solutions compared to Industry 4.0. Edge Computing
(EC) allows data analysis on edge devices. Artificial intelligence (AI) has become the focus …
(EC) allows data analysis on edge devices. Artificial intelligence (AI) has become the focus …
Multi-agent deep reinforcement learning-based partial task offloading and resource allocation in edge computing environment
H Ke, H Wang, H Sun - Electronics, 2022 - mdpi.com
In the dense data communication environment of 5G wireless networks, with the dramatic
increase in the amount of request computation tasks generated by intelligent wireless …
increase in the amount of request computation tasks generated by intelligent wireless …
Detecting DGA-based botnets through effective phonics-based features
D Zhao, H Li, X Sun, Y Tang - Future Generation Computer Systems, 2023 - Elsevier
Botnets are machines that are increasingly controlled by cybercriminals to perform various
attacks. Traditional methods of defense, such as blocklisting, become ineffective because …
attacks. Traditional methods of defense, such as blocklisting, become ineffective because …
Adversarial robustness in hybrid quantum-classical deep learning for botnet dga detection
H Suryotrisongko, Y Musashi, A Tsuneda… - Journal of Information …, 2022 - jstage.jst.go.jp
This paper aims to contribute to the adversarial defense research gap in the current state-of-
the-art of adversarial machine learning (ML) attacks and defense. More specifically, it …
the-art of adversarial machine learning (ML) attacks and defense. More specifically, it …