A comprehensive survey on poisoning attacks and countermeasures in machine learning

Z Tian, L Cui, J Liang, S Yu - ACM Computing Surveys, 2022 - dl.acm.org
The prosperity of machine learning has been accompanied by increasing attacks on the
training process. Among them, poisoning attacks have become an emerging threat during …

Classifying IoT devices in smart environments using network traffic characteristics

A Sivanathan, HH Gharakheili, F Loi… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society, and
smart homes, enterprises, and cities are increasingly being equipped with a plethora of IoT …

A distributed deep learning system for web attack detection on edge devices

Z Tian, C Luo, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT
devices and sensors transmit huge amounts of data to cloud data centers for further …

Fs-net: A flow sequence network for encrypted traffic classification

C Liu, L He, G Xiong, Z Cao, Z Li - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With more attention paid to user privacy and communication security, the volume of
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity

B Anderson, D McGrew - Proceedings of the 23rd ACM SIGKDD …, 2017 - dl.acm.org
The application of machine learning for the detection of malicious network traffic has been
well researched over the past several decades; it is particularly appealing when the traffic is …

A review of computer vision methods in network security

J Zhao, R Masood, S Seneviratne - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Network security has become an area of significant importance more than ever as
highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure …

[PDF][PDF] FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications.

D Barradas, N Santos, L Rodrigues, S Signorello… - NDSS, 2021 - ndss-symposium.org
An emerging trend in network security consists in the adoption of programmable switches for
performing various security tasks in large-scale, high-speed networks. However, since …

Deciphering malware's use of TLS (without decryption)

B Anderson, S Paul, D McGrew - Journal of Computer Virology and …, 2018 - Springer
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …

Packet-level signatures for smart home devices

R Trimananda, J Varmarken, A Markopoulou… - Network and …, 2020 - par.nsf.gov
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …