Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions

O Mengara, A Avila, TH Falk - IEEE Access, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) classifiers are potent instruments that can be used in various
security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …

[HTML][HTML] Network Covert Channels

M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …

[PDF][PDF] Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning

N Cassavia, L Caviglione, M Guarascio… - Journal of Wireless …, 2022 - jowua.com
Steganography is increasingly exploited by malware to avoid detection and to implement
different advanced offensive schemes. An attack paradigm expected to become widely used …

A deep learning approach for detecting covert timing channel attacks using sequential data

S Al-Eidi, O Darwish, Y Chen, M Maabreh… - Cluster …, 2024 - Springer
The advanced development of communication technologies has made covert
communications quite challenging to be recognized. By altering an entity's timing behavior …

Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - Journal of Intelligent …, 2023 - Springer
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …

[PDF][PDF] An ensemble model to detect packet length covert channels.

MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …

Covert channel detection and generation techniques: A survey

NA AL-Khulaidi, AT Zahary… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The use of covert communications has become more widespread recently as a solution to
the information security issue. Information security can be partially solved by the discovery …

Ensembling sparse autoencoders for network covert channel detection in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - … on Methodologies for …, 2022 - Springer
Network covert channels are becoming exploited by a wide-range of threats to avoid
detection. Such offensive schemes are expected to be also used against IoT deployments …

[PDF][PDF] Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning.

M Guarascio, M Zuppelli, N Cassavia, G Manco… - ITASEC, 2022 - ceur-ws.org
Steganographic techniques and covert channels are becoming exploited by a wide-range of
malware to avoid detection and bypass network security tools. With the ubiquitous diffusion …