" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Seiot: Detecting anomalous semantics in smart homes via knowledge graph

R Li, Q Li, Y Huang, Q Zou, D Zhao… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Existing IoT Network Anomaly Detection Systems (NADSes) typically treat IoT devices as
independent entities and model them by Euclidean space features. These approaches suffer …

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild

Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu… - Proceedings of the …, 2023 - dl.acm.org
Cryptocurrency mining is a crucial operation in blockchains, and miners often join mining
pools to increase their chances of earning rewards. However, the energy-intensive nature of …

[HTML][HTML] A convolutional autoencoder architecture for robust network intrusion detection in embedded systems

N Borgioli, F Aromolo, LTX Phan, G Buttazzo - Journal of Systems …, 2024 - Elsevier
Security threats are becoming an increasingly relevant concern in cyber–physical systems.
Cyber attacks on these systems are not only common today but also increasingly …

Prevention of cryptojacking attacks in business and FinTech applications

S Ullah, T Ahmad, R Ahmad, M Aslam - Handbook of Research on …, 2023 - igi-global.com
More than 2000 different cryptocurrencies are currently available in business and FinTech
applications. Cryptocurrency is a digital payment system that does not rely on banks to verify …

Magtracer: Detecting GPU cryptojacking attacks via magnetic leakage signals

R Xiao, T Li, S Ramesh, J Han, J Han - Proceedings of the 29th Annual …, 2023 - dl.acm.org
GPU cryptojacking is an attack that hijacks GPU resources of victims for cryptocurrency
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …

Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective

A Adeniran, K Human, D Mohaisen - arXiv preprint arXiv:2408.03426, 2024 - arxiv.org
This paper conducts a comprehensive examination of the infrastructure supporting
cryptojacking operations. The analysis elucidates the methodologies, frameworks, and …