Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,665 Hits in 1.7 sec

Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework

Luhui Yang, Guangjie Liu, Yuewei Dai, Jinwei Wang, Jiangtao Zhai
2020 IEEE Access  
In recent years, stealthy domain generation algorithms (SDGA) have been proposed and revealed significantly stronger stealthiness comparing to the traditional character-based DGA.  ...  Distinguishing malicious domain names generated by various domain generation algorithms (DGA) is critical for defending a network against sophisticated network attacks.  ...  an algorithm for generating a domain name.  ... 
doi:10.1109/access.2020.2988877 fatcat:lyxrcqalwneprdiejbypru7w7y

A multi-robot approach to stealthy navigation in the presence of an observer

A.D. Tews, G.S. Sukhatme, M.J. Mataric
2004 IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004  
This produces a robust and reactive solution for stealthy navigation since there is no global path planning and the robots are not committed to any particular path.  ...  They generate an occupancy grid representation of the environment which is modeled using potential fields with embedded task information. These fields are combined and navigation waypoints extracted.  ...  domain.  ... 
doi:10.1109/robot.2004.1307417 dblp:conf/icra/TewsSM04 fatcat:e4qg2fkkfrc7jnc6oywwehbx2u

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild

Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang
2023 Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security  
By examining the 19,601 stealthy mining pool domains and * Both authors contributed equally to this research.  ...  We report 7,629 stealthy mining pools among 59 countries. Further, we study the inner mechanisms of stealthy mining pools.  ...  Figure 7 shows the CDF of lifespan distribution of public mining pools and stealthy mining pools respectively, generated from 17,488 domains of stealthy pools and 2,442 domains of public pools.  ... 
doi:10.1145/3576915.3616677 fatcat:ppscl3rdafc4vimgorgpq2o63y

Stealing complex network attack detection method considering security situation awareness

Bo Xi, Huiying Liu, Botao Hou, Ying Wang, Yuling Guo, Sathishkumar Veerappampalayam Easwaramoorthy
2024 PLoS ONE  
Therefore, this paper proposes a monitoring method of stealthy complex network attacks considering security situation awareness.  ...  The cost of a single monitoring node is calculated by the algorithm, and the monitoring node is determined by the monitoring node algorithm, so as to reduce the resource occupancy rate of the monitoring  ...  The densitybased clustering algorithm was used to preprocess the self-training data, and the clustering analysis was carried out to remove the noise and generate a detector to complete the anomaly detection  ... 
doi:10.1371/journal.pone.0298555 pmid:38512902 pmcid:PMC10956872 fatcat:d6wixklembel5iyvhmhckgvoai

PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking [article]

Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji
2022 arXiv   pre-print
Fig. 2 : 2 Fig. 2: Attack Success Rate on KWS (%) Algorithm 1 Trigger generation algorithm Input: Benign audio sample: benign sample; High-amplitude signal: hs; Output: Trigger audio sample: trigger  ...  As shown in Figure 1 , the framework of the approach comprises two phases -a trigger generation phase (see Algorithm 1) and a poisoning training phase.  ... 
arXiv:2211.08697v1 fatcat:l2bfqszujrcdtbeok7h6fttmpi

Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound [article]

Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li
2023 arXiv   pre-print
Our attacks can generate more 'natural' poisoned samples and therefore are more stealthy.  ...  We reveal that existing methods are not stealthy since their trigger patterns are perceptible to humans or machine detection.  ...  We conduct the inverse Fourier transformation F −1 [46] to obtain poisoned audio with pitch-type triggers by turning frequency-domain signals back to the time domain (Line 7 in Algorithm 1). C.  ... 
arXiv:2307.08208v1 fatcat:hdb3yj2agjapxislg35mnqo5k4

Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal Infrared Detectors in Physical World [article]

Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen
2023 arXiv   pre-print
For stealthiness, our method involves attaching the adversarial infrared block to the inside of clothing, enhancing its stealthiness.  ...  We evaluate the proposed method based on its effectiveness, stealthiness, and robustness.  ...  physical domains.  ... 
arXiv:2304.10712v4 fatcat:ocngtrbec5ccxji2d5syjlzkde

MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World [article]

Zheng Zhou, Hongbo Zhao, Ju Liu, Qiaosheng Zhang, Liwei Geng, Shuchang Lyu, Wenquan Feng
2024 arXiv   pre-print
These findings emphasize the remarkable stealthiness and transferability of the proposed MVPatch attack algorithm.  ...  Extensive experiments demonstrate that the proposed MVPatch algorithm achieves superior attack transferability compared to similar algorithms in both digital and physical domains while also exhibiting  ...  These findings emphasize the remarkable stealthiness and transferability of the proposed MVPatch attack algorithm.  ... 
arXiv:2312.17431v2 fatcat:qzmd4bqppbecviljboawpyw4ry

Quantitatively Analyzing Stealthy Communication Channels [chapter]

Patrick Butler, Kui Xu, Danfeng Yao
2011 Lecture Notes in Computer Science  
We analyze the use of domain name service (DNS) as a stealthy botnet command-and-control channel, which allows multiple entities to pass messages stored in DNS records to each other.  ...  Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control.  ...  We leave an open question on how to algorithmically generate short-lived and realistic-looking domain names.  ... 
doi:10.1007/978-3-642-21554-4_14 fatcat:r5s7g3ygkvgntpyzdmth5vn7cq

Synthesizing stealthy reprogramming attacks on cardiac devices

Nicola Paoletti, Zhihao Jiang, Md Ariful Islam, Houssam Abbas, Rahul Mangharam, Shan Lin, Zachary Gruber, Scott A. Smolka
2019 Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems - ICCPS '19  
Our method can be tailored to the patient's current condition, and readily generalizes to new rhythms.  ...  Our method can be tailored to the patient's current condition, and readily generalizes to new rhythms.  ...  Our work leverages [12] for the generation of synthetic EGMs and the modeling of the ICD algorithm, but tackles the fundamentally different problem of designing stealthy attacks on ICDs, and uses formal  ... 
doi:10.1145/3302509.3311044 dblp:conf/iccps/PaolettiJIAMLGS19 fatcat:upgd7lbemrfmnjp6amjhst6gxq

Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping [article]

Behnam Ghavami, Seyd Movi, Zhenman Fang, Lesley Shannon
2021 arXiv   pre-print
Shortly after that, the vulnerability of DNNs were revealed by stealthy adversarial examples where crafted inputs -- by adding tiny perturbations to original inputs -- can lead a DNN to generate misclassification  ...  Experimental results show that we can successfully apply our stealthy attack against state-of-the-art algorithmic-protected DNNs.  ...  Hence, it could not be applied in more general scenarios all untargeted ones, discussed in Section II-B1, try to drop the such as autonomous vehicles, where the domain generalization DNN accuracy  ... 
arXiv:2112.13162v1 fatcat:jf6up5vonrbhvipf2sknpczdpq

Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery

Hao Zhang, Danfeng Daphne Yao, Naren Ramakrishnan
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Our solution is based on domain-knowledge guided advanced learning algorithms.  ...  Studies show that a significant portion of networked computers are infected with stealthy malware. Infection allows remote attackers to control, utilize, or spy on victim machines.  ...  However, none of these above solutions is designed for detecting general stealthy malware activities. Thus, they cannot be directly applied to solve the problem.  ... 
doi:10.1145/2590296.2590309 dblp:conf/ccs/ZhangYR14 fatcat:kffyvrimzrca5laimnsovbcbv4

Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon [article]

Chengyin Hu, Weiwen Shi
2022 arXiv   pre-print
stealthy and naturalistic adversarial attacks against advanced DNNs in physical environments.  ...  In this work, we study a new type of physical attack, called adversarial catoptric light (AdvCL), in which adversarial perturbations are generated by common natural phenomena, catoptric light, to achieve  ...  In general, there is a compromise between robustness and stealthiness when an attacker executes physical attacks.  ... 
arXiv:2209.11739v1 fatcat:bgobrv5c6zaqlaujkjtha2fbom

A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data

Sohrab Mokhtari, Alireza Abbaspour, Kang K. Yen, Arman Sargolzaei
2021 Electronics  
The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.  ...  A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset.  ...  The machine learning algorithms are trained and tested by employing Python. The procedure of generating the model is shown in Figure 2 .  ... 
doi:10.3390/electronics10040407 fatcat:a4lwfxszdjhdpk3tcpoqgcibi4

On the Elements of Datasets for Cyber Physical Systems Security [article]

Ashraf Tantawy
2022 arXiv   pre-print
However, unlike other AI domains, a CPS is a complex system with many interfaces that determine its behavior.  ...  Datasets are essential to apply AI algorithms to Cyber Physical System (CPS) Security.  ...  Attacks are automatically-generated and some attacks are stealthy.  ... 
arXiv:2208.08255v1 fatcat:vqf6tojylnhpxivnp3v5z4azj4
« Previous Showing results 1 — 15 out of 3,665 results