Zobrazeno 1 - 10
of 118
pro vyhledávání: '"Morla, Ricardo"'
Command and Control (C2) communication is a key component of any structured cyber-attack. As such, security operations actively try to detect this type of communication in their networks. This poses a problem for legitimate pentesters that try to rem
Externí odkaz:
http://arxiv.org/abs/2209.00943
Autor:
Novo, Carlos, Morla, Ricardo
State of the art deep learning techniques are known to be vulnerable to evasion attacks where an adversarial sample is generated from a malign sample and misclassified as benign. Detection of encrypted malware command and control traffic based on TCP
Externí odkaz:
http://arxiv.org/abs/2009.01122
Autor:
Morla, Ricardo
With the turmoil in cybersecurity and the mind-blowing advances in AI, it is only natural that cybersecurity practitioners consider further employing learning techniques to help secure their organizations and improve the efficiency of their security
Externí odkaz:
http://arxiv.org/abs/1912.06817
Autor:
Rodrigues, Eduardo, Morla, Ricardo
Data science and machine learning algorithms running on big data infrastructure are increasingly important in activities ranging from business intelligence and analytics to cybersecurity, smart city management, and many fields of science and engineer
Externí odkaz:
http://arxiv.org/abs/1710.03040
Detection of abnormal BGP events is of great importance to preserve the security and robustness of the Internet inter-domain routing system. In this paper, we propose an anomaly detection framework based on machine learning techniques to identify the
Externí odkaz:
http://arxiv.org/abs/1708.03453
Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior among other reasons. Anomaly detection and distinction are in
Externí odkaz:
http://arxiv.org/abs/1707.02933
Autor:
Allahdadi, Anisa, Morla, Ricardo
IEEE 802.11 Wireless Networks are getting more and more popular at university campuses, enterprises, shopping centers, airports and in so many other public places, providing Internet access to a large crowd openly and quickly. The wireless users are
Externí odkaz:
http://arxiv.org/abs/1707.00948
Autor:
Morla, Ricardo
HTTP response size is a well-known side channel attack. With the deployment of HTTP/2.0, response size estimation attacks are generally dismissed with the argument that pipelining and response multiplexing prevent eavesdroppers from finding out respo
Externí odkaz:
http://arxiv.org/abs/1707.00641
Autor:
Morla, Ricardo
HTTP response size is a well-known side channel attack. With the deployment of HTTP/2.0, response size attacks are generally dismissed with the argument that pipelining and response multiplexing prevent eavesdroppers from finding out response sizes.
Externí odkaz:
http://arxiv.org/abs/1607.06709