Adversarial machine learning for network intrusion detection systems: A comprehensive survey

K He, DD Kim, MR Asghar - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Unsolved problems in ml safety

D Hendrycks, N Carlini, J Schulman… - arXiv preprint arXiv …, 2021 - arxiv.org
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection

L Demetrio, SE Coull, B Biggio, G Lagorio… - ACM Transactions on …, 2021 - dl.acm.org
Recent work has shown that adversarial Windows malware samples—referred to as
adversarial EXE mples in this article—can bypass machine learning-based detection relying …

You autocomplete me: Poisoning vulnerabilities in neural code completion

R Schuster, C Song, E Tromer… - 30th USENIX Security …, 2021 - usenix.org
Code autocompletion is an integral feature of modern code editors and IDEs. The latest
generation of autocompleters uses neural language models, trained on public open-source …

Modeling realistic adversarial attacks against network intrusion detection systems

G Apruzzese, M Andreolini, L Ferretti… - … Threats: Research and …, 2022 - dl.acm.org
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …

{Explanation-Guided} backdoor poisoning attacks against malware classifiers

G Severi, J Meyer, S Coull, A Oprea - 30th USENIX security symposium …, 2021 - usenix.org
Training pipelines for machine learning (ML) based malware classification often rely on
crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study …