Công bố khoa học

A federated threat hunting system with big data analysis for SDN-enabled networks

3 năm trước

Software-defined networking (SDN) is a potential approach for modern network architecture, which has received great attention recently. SDN-based networks also face security issues, and they can become targets of cyberattacks. Cyber threat hunting is one of the security solutions proposed for early attack detection in SDN. Developing machine learning-based IDS…

Đọc tiếp >>>

Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context

3 năm trước

In large-scale networks like the Industrial Internet of Things (IIoT), it is more important to monitor and enforce the security policy within an appropriate time due to the continuous widespread of cyberattacks. This is a tough challenge in traditional network architecture; thus, each network element’s network management is unsuitable for…

Đọc tiếp >>>

DA-GAN: Domain Adaptation for Generative Adversarial Networks-assisted Cyber Threat Detection

3 năm trước

The rising development of machine learning (ML) techniques has become the motivation for research in applying their outstanding features to facilitate intelligent intrusion detection systems (IDSs). However, ML-based solutions also have drawbacks of high false positive rates and vulnerability to sophisticated attacks such as adversarial ones. Therefore, continuous evaluation and…

Đọc tiếp >>>

A Blockchain-based approach and Attribute-based Encryption for Healthcare Record Data Exchange

3 năm trước

Sharing medical data can help doctors to give a more rapid and accurate diagnosis of a patient’s health problems. However, electronic healthcare records (EHRs) are also considered sensitive data, whose sharing may raise issues of security and privacy. Most current healthcare systems not only manage their data in centralized databases…

Đọc tiếp >>>

uitXkernel: Android Kernel Forensic for Security Analysis Purposes

3 năm trước

The Android operating systems is becoming more popular. Security analysis on Android devices is necessary. We can perform security assessment on difference components of Android operating system such as pre-installed applications component, application framework component, or Linux kernel (Android kernel) component. Most of the current studies focus on pre-installed applications,…

Đọc tiếp >>>

UIT-ADF: A System for Android Device Forensics

3 năm trước

Today, Android mobile phones have shown their popularity with more than two billion users worldwide. Through the use of the application, the user’s personal data will be stored on the Android device. These data are especially important in digital investigation. The logical extraction method is one of the popular methods…

Đọc tiếp >>>

Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors

3 năm trước

To build an effective malware detector, it is required to collect a diversity of malware samples and their evolution, since malware authors always try to evade detectors through strategies of malware mutation. So, this paper explores the ability to craft mutants of malware for gathering numerous mutated samples in training…

Đọc tiếp >>>

A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation

3 năm trước

Recently, the development in both quantity and complication of malware has raised a need of powerful malware detection solution. The outstanding characteristics of machine learning (ML) and deep learning (DL) techniques has been leveraged in the fight against malware. However, they are proved to be vulnerable against adversarial attacks, where…

Đọc tiếp >>>

A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning

3 năm trước

Nowadays, the amount of data generated from Internet of Things (IoT) devices is increasing, paving the way for the development of artificial intelligence (AI) applications. However, with the traditional AI approach, users sharing their raw data causes many concerns in terms of privacy leakage. There have been reports that there…

Đọc tiếp >>>