A review of Machine Learning-based zero-day attack detection: Challenges and future directions

Y Guo - Computer communications, 2023 - Elsevier
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by
cybersecurity detection tools. The studies (Bilge and Dumitraş, 2012, Google, 0000 …

Hybrid-based analysis impact on ransomware detection for Android systems

R Almohaini, I Almomani, A AlKhayer - Applied Sciences, 2021 - mdpi.com
Android ransomware is one of the most threatening attacks that is increasing at an alarming
rate. Ransomware attacks usually target Android users by either locking their devices or …

Toward the detection of polyglot files

L Koch, S Oesch, A Chaulagain, M Adkisson… - Proceedings of the 15th …, 2022 - dl.acm.org
Standardized file types play a key role in the development and use of computer software.
However, it is possible to confound standardized file type processing by creating a file that is …

Cryptocurrency mining malware detection based on behavior pattern and graph neural network

R Zheng, Q Wang, J He, J Fu, G Suri… - Security and …, 2022 - Wiley Online Library
Miner malware has been steadily increasing in recent years as the value of cryptocurrency
rises, which poses a considerable threat to users' device security. Miner malware has …

On the Abuse and Detection of Polyglot Files

L Koch, S Oesch, A Chaulagain, J Dixon… - arXiv preprint arXiv …, 2024 - arxiv.org
A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for
malware detection systems that route files to format-specific detectors/signatures, as well as …

Revolutionizing Cybersecurity: The GPT-2 Enhanced Attack Detection and Defense (GEADD) Method for Zero-Day Threats

R Jones, M Omar - … Journal of Informatics, Information System and …, 2024 - ojs.unikom.ac.id
The escalating sophistication of cyber threats, particularly zero-day attacks, necessitates
advanced detection methodologies in cybersecurity. This study introduces the GPT-2 …

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

RA Bridges, B Weber, JM Beaver… - … Conference on Big …, 2023 - ieeexplore.ieee.org
This work presents an evaluation of six prominent commercial endpoint malware detectors,
a network malware detector, and a file-conviction algorithm from a cyber technology vendor …

What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity

E Begoli, RA Bridges, S Oesch, KE Knight - arXiv preprint arXiv …, 2021 - arxiv.org
Policy-mandated, rigorously administered scientific testing is needed to provide
transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools …

Fortifying Network Security with Machine Learning

A Yanguema - Available at SSRN 4663593, 2023 - papers.ssrn.com
The pervasive integration of machine learning in various domains has positioned it at the
forefront of technological advancements, with cybersecurity being a significant beneficiary …

Detection and Classification of Polyglot Files Using Machine Learning

MA Adkisson - 2022 - search.proquest.com
Polyglots, files that are valid as more than one type, are a relatively new threat to
cybersecurity. They pose a threat because they often go undetected by existing file type …