SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild

Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu… - Proceedings of the …, 2023 - dl.acm.org
Cryptocurrency mining is a crucial operation in blockchains, and miners often join mining
pools to increase their chances of earning rewards. However, the energy-intensive nature of …

Prevention of Cryptojacking Attacks in Business and FinTech Applications

S Ullah, T Ahmad, R Ahmad, M Aslam - Handbook of Research on …, 2023 - igi-global.com
More than 2000 different cryptocurrencies are currently available in business and FinTech
applications. Cryptocurrency is a digital payment system that does not rely on banks to verify …

MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals

R Xiao, T Li, S Ramesh, J Han, J Han - Proceedings of the 29th Annual …, 2023 - dl.acm.org
GPU cryptojacking is an attack that hijacks GPU resources of victims for cryptocurrency
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …

Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots

J Franco, A Acar, A Aris… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies have transformed financial transactions and created
opportunities to profit from generating new coins through cryptomining. This has led to …

Mining IoT Network Traffic in Smart Homes: Traffic Measurement, Pattern Recognition, and Security Applications

Y Wan - 2023 - search.proquest.com
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing
have driven the widespread deployment of Internet-of-Things (IoT) devices in smart homes …

A Systematic Review of Cryptocurrencies Use in Cybercrimes

KBD Human - 2023 - stars.library.ucf.edu
Cryptocurrencies are one of the most prominent applications of blockchain systems. While
cryptocurrencies promise many features and advantages, such as decentralization …