A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework
2020
IEEE Access
In recent years, stealthy domain generation algorithms (SDGA) have been proposed and revealed significantly stronger stealthiness comparing to the traditional character-based DGA. ...
Distinguishing malicious domain names generated by various domain generation algorithms (DGA) is critical for defending a network against sophisticated network attacks. ...
an algorithm for generating a domain name. ...
doi:10.1109/access.2020.2988877
fatcat:lyxrcqalwneprdiejbypru7w7y
A multi-robot approach to stealthy navigation in the presence of an observer
2004
IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004
This produces a robust and reactive solution for stealthy navigation since there is no global path planning and the robots are not committed to any particular path. ...
They generate an occupancy grid representation of the environment which is modeled using potential fields with embedded task information. These fields are combined and navigation waypoints extracted. ...
domain. ...
doi:10.1109/robot.2004.1307417
dblp:conf/icra/TewsSM04
fatcat:e4qg2fkkfrc7jnc6oywwehbx2u
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
By examining the 19,601 stealthy mining pool domains and * Both authors contributed equally to this research. ...
We report 7,629 stealthy mining pools among 59 countries. Further, we study the inner mechanisms of stealthy mining pools. ...
Figure 7 shows the CDF of lifespan distribution of public mining pools and stealthy mining pools respectively, generated from 17,488 domains of stealthy pools and 2,442 domains of public pools. ...
doi:10.1145/3576915.3616677
fatcat:ppscl3rdafc4vimgorgpq2o63y
Stealing complex network attack detection method considering security situation awareness
2024
PLoS ONE
Therefore, this paper proposes a monitoring method of stealthy complex network attacks considering security situation awareness. ...
The cost of a single monitoring node is calculated by the algorithm, and the monitoring node is determined by the monitoring node algorithm, so as to reduce the resource occupancy rate of the monitoring ...
The densitybased clustering algorithm was used to preprocess the self-training data, and the clustering analysis was carried out to remove the noise and generate a detector to complete the anomaly detection ...
doi:10.1371/journal.pone.0298555
pmid:38512902
pmcid:PMC10956872
fatcat:d6wixklembel5iyvhmhckgvoai
PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
[article]
2022
arXiv
pre-print
Fig. 2 : 2 Fig. 2: Attack Success Rate on KWS (%)
Algorithm 1 Trigger generation algorithm Input: Benign audio sample: benign sample; High-amplitude signal: hs; Output: Trigger audio sample: trigger ...
As shown in Figure 1 , the framework of the approach comprises two phases -a trigger generation phase (see Algorithm 1) and a poisoning training phase. ...
arXiv:2211.08697v1
fatcat:l2bfqszujrcdtbeok7h6fttmpi
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
[article]
2023
arXiv
pre-print
Our attacks can generate more 'natural' poisoned samples and therefore are more stealthy. ...
We reveal that existing methods are not stealthy since their trigger patterns are perceptible to humans or machine detection. ...
We conduct the inverse Fourier transformation F −1 [46] to obtain poisoned audio with pitch-type triggers by turning frequency-domain signals back to the time domain (Line 7 in Algorithm 1).
C. ...
arXiv:2307.08208v1
fatcat:hdb3yj2agjapxislg35mnqo5k4
Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal Infrared Detectors in Physical World
[article]
2023
arXiv
pre-print
For stealthiness, our method involves attaching the adversarial infrared block to the inside of clothing, enhancing its stealthiness. ...
We evaluate the proposed method based on its effectiveness, stealthiness, and robustness. ...
physical domains. ...
arXiv:2304.10712v4
fatcat:ocngtrbec5ccxji2d5syjlzkde
MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World
[article]
2024
arXiv
pre-print
These findings emphasize the remarkable stealthiness and transferability of the proposed MVPatch attack algorithm. ...
Extensive experiments demonstrate that the proposed MVPatch algorithm achieves superior attack transferability compared to similar algorithms in both digital and physical domains while also exhibiting ...
These findings emphasize the remarkable stealthiness and transferability of the proposed MVPatch attack algorithm. ...
arXiv:2312.17431v2
fatcat:qzmd4bqppbecviljboawpyw4ry
Quantitatively Analyzing Stealthy Communication Channels
[chapter]
2011
Lecture Notes in Computer Science
We analyze the use of domain name service (DNS) as a stealthy botnet command-and-control channel, which allows multiple entities to pass messages stored in DNS records to each other. ...
Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. ...
We leave an open question on how to algorithmically generate short-lived and realistic-looking domain names. ...
doi:10.1007/978-3-642-21554-4_14
fatcat:r5s7g3ygkvgntpyzdmth5vn7cq
Synthesizing stealthy reprogramming attacks on cardiac devices
2019
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems - ICCPS '19
Our method can be tailored to the patient's current condition, and readily generalizes to new rhythms. ...
Our method can be tailored to the patient's current condition, and readily generalizes to new rhythms. ...
Our work leverages [12] for the generation of synthetic EGMs and the modeling of the ICD algorithm, but tackles the fundamentally different problem of designing stealthy attacks on ICDs, and uses formal ...
doi:10.1145/3302509.3311044
dblp:conf/iccps/PaolettiJIAMLGS19
fatcat:upgd7lbemrfmnjp6amjhst6gxq
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
[article]
2021
arXiv
pre-print
Shortly after that, the vulnerability of DNNs were revealed by stealthy adversarial examples where crafted inputs -- by adding tiny perturbations to original inputs -- can lead a DNN to generate misclassification ...
Experimental results show that we can successfully apply our stealthy attack against state-of-the-art algorithmic-protected DNNs. ...
Hence, it could not be applied in more general scenarios all untargeted ones, discussed in Section II-B1, try to drop the
such as autonomous vehicles, where the domain generalization DNN accuracy ...
arXiv:2112.13162v1
fatcat:jf6up5vonrbhvipf2sknpczdpq
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
Our solution is based on domain-knowledge guided advanced learning algorithms. ...
Studies show that a significant portion of networked computers are infected with stealthy malware. Infection allows remote attackers to control, utilize, or spy on victim machines. ...
However, none of these above solutions is designed for detecting general stealthy malware activities. Thus, they cannot be directly applied to solve the problem. ...
doi:10.1145/2590296.2590309
dblp:conf/ccs/ZhangYR14
fatcat:kffyvrimzrca5laimnsovbcbv4
Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
[article]
2022
arXiv
pre-print
stealthy and naturalistic adversarial attacks against advanced DNNs in physical environments. ...
In this work, we study a new type of physical attack, called adversarial catoptric light (AdvCL), in which adversarial perturbations are generated by common natural phenomena, catoptric light, to achieve ...
In general, there is a compromise between robustness and stealthiness when an attacker executes physical attacks. ...
arXiv:2209.11739v1
fatcat:bgobrv5c6zaqlaujkjtha2fbom
A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data
2021
Electronics
The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed. ...
A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. ...
The machine learning algorithms are trained and tested by employing Python. The procedure of generating the model is shown in Figure 2 . ...
doi:10.3390/electronics10040407
fatcat:a4lwfxszdjhdpk3tcpoqgcibi4
On the Elements of Datasets for Cyber Physical Systems Security
[article]
2022
arXiv
pre-print
However, unlike other AI domains, a CPS is a complex system with many interfaces that determine its behavior. ...
Datasets are essential to apply AI algorithms to Cyber Physical System (CPS) Security. ...
Attacks are automatically-generated and some attacks are stealthy. ...
arXiv:2208.08255v1
fatcat:vqf6tojylnhpxivnp3v5z4azj4
« Previous
Showing results 1 — 15 out of 3,665 results