Skip to main content

Showing 1–20 of 20 results for author: Apruzzese, G

.
  1. arXiv:2405.02642  [pdf, other

    cs.LG

    Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation

    Authors: Kevin Lange, Federico Fontana, Francesco Rossi, Mattia Varile, Giovanni Apruzzese

    Abstract: Modern spacecraft are increasingly relying on machine learning (ML). However, physical equipment in space is subject to various natural hazards, such as radiation, which may inhibit the correct operation of computing devices. Despite plenty of evidence showing the damage that naturally-induced faults can cause to ML-related hardware, we observe that the effects of radiation on ML models for space… ▽ More

    Submitted 29 May, 2024; v1 submitted 4 May, 2024; originally announced May 2024.

  2. "Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages

    Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang

    Abstract: Machine learning based phishing website detectors (ML-PWD) are a critical part of today's anti-phishing solutions in operation. Unfortunately, ML-PWD are prone to adversarial evasions, evidenced by both academic studies and analyses of real-world adversarial phishing webpages. However, existing works mostly focused on assessing adversarial phishing webpages against ML-PWD, while neglecting a cruci… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  3. Understanding the Process of Data Labeling in Cybersecurity

    Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese

    Abstract: Many domains now leverage the benefits of Machine Learning (ML), which promises solutions that can autonomously learn to solve complex tasks by training over some data. Unfortunately, in cyberthreat detection, high-quality data is hard to come by. Moreover, for some specific applications of ML, such data must be labeled by human operators. Many works "assume" that labeling is tough/challenging/cos… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  4. arXiv:2311.16383  [pdf, other

    cs.CR

    "Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages

    Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese

    Abstract: Phishing websites are everywhere, and countermeasures based on static blocklists cannot cope with such a threat. To address this problem, state-of-the-art solutions entail the application of machine learning (ML) to detect phishing websites by checking if they visually resemble webpages of well-known brands. These techniques have achieved promising results in research and, consequently, some secur… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  5. arXiv:2308.09392  [pdf, other

    cs.CR

    Attacking logo-based phishing website detectors with adversarial perturbations

    Authors: Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran

    Abstract: Recent times have witnessed the rise of anti-phishing schemes powered by deep learning (DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision to identify logos of well-known brands on webpages, to detect malicious webpages that imitate a given brand. For instance, Siamese networks have demonstrated notable performance for these tasks, enabling the corresponding a… ▽ More

    Submitted 12 September, 2023; v1 submitted 18 August, 2023; originally announced August 2023.

    Comments: To appear in ESORICS 2023

  6. arXiv:2305.00550  [pdf, other

    cs.CR cs.LG cs.NI

    SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

    Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider

    Abstract: Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For Network Intrusion Detection (NID), however, scientific advances in ML are still seen with skepticism by practitioners. This disconnection is due to the intrinsically limited scope of research papers, many of which primarily aim to demonstrate new methods ``outperforming'' prior work -- oftentimes overlooking the… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  7. A new indirect measurement method of the electron temperature for the Protosphera's pinch plasma

    Authors: D. Iannarelli, F. Napoli, F. Alladio, G. Apruzzese, F. Bombarda, P. Buratti, J. Delfini, A. De Ninno, F. Filippi, D. Fiorucci, A. Ingenito, S. Mannori, P. Micozzi, P. Teofilatto

    Abstract: This article presents a new method for estimating the electron temperature of the Protosphera's screw pinch. The temperature radial profile is obtained by a self-consistent modeling of a 1D MHD equilibrium along with a 0D power balance of the plasma column, given measurements and estimates of the axial pinch plasma current, of the plasma rotational frequency and, at the equatorial plane, of the el… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 4 pages, 6 figures, 1 table, research presented to the "6th ICFDT"

  8. arXiv:2212.14315  [pdf, other

    cs.CR cs.LG

    "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

    Authors: Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy

    Abstract: Recent years have seen a proliferation of research on adversarial machine learning. Numerous papers demonstrate powerful algorithmic attacks against a wide variety of machine learning (ML) models, and numerous other papers propose defenses that can withstand most attacks. However, abundant real-world evidence suggests that actual attackers use simple tactics to subvert ML-driven systems, and as a… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

  9. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors

    Authors: Giovanni Apruzzese, V. S. Subrahmanian

    Abstract: Although machine learning based algorithms have been extensively used for detecting phishing websites, there has been relatively little work on how adversaries may attack such "phishing detectors" (PDs for short). In this paper, we propose a set of Gray-Box attacks on PDs that an adversary may use which vary depending on the knowledge that he has about the PD. We show that these attacks severely d… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

  10. arXiv:2210.13660  [pdf, other

    cs.CR cs.LG cs.NI

    Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

    Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti

    Abstract: Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model, or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual feasibility of the attack or the defense. Moreover, adversarial samples are often crafted in the "feature-space", making the corresponding evaluations of questionable value. Simply p… ▽ More

    Submitted 11 October, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

  11. arXiv:2210.13119  [pdf, other

    cs.CR cs.CY

    Cybersecurity in the Smart Grid: Practitioners' Perspective

    Authors: Jacqueline Meyer, Giovanni Apruzzese

    Abstract: The Smart Grid (SG) is a cornerstone of modern society, providing the energy required to sustain billions of lives and thousands of industries. Unfortunately, as one of the most critical infrastructures of our World, the SG is an attractive target for attackers. The problem is aggravated by the increasing adoption of digitalisation, which further increases the SG's exposure to cyberthreats. Succes… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  12. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

    Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti

    Abstract: Did you know that over 70 million of Dota2 players have their in-game data freely accessible? What if such data is used in malicious ways? This paper is the first to investigate such a problem. Motivated by the widespread popularity of video games, we propose the first threat model for Attribute Inference Attacks (AIA) in the Dota2 context. We explain how (and why) attackers can exploit the abun… ▽ More

    Submitted 30 April, 2023; v1 submitted 17 October, 2022; originally announced October 2022.

  13. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

    Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov

    Abstract: Fifth Generation (5G) networks must support billions of heterogeneous devices while guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet with human effort alone, and Machine Learning (ML) represents a core asset in 5G. ML, however, is known to be vulnerable to adversarial examples; moreover, as our paper will show, the 5G context is exposed to a yet another type… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  14. arXiv:2206.09707  [pdf, other

    cs.CR cs.LG

    The Role of Machine Learning in Cybersecurity

    Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco

    Abstract: Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such discrepancy has its root cause in the current state-of-the-art, which does not allow to identify the… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

  15. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

    Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova

    Abstract: Machine learning (ML) has become an important paradigm for cyberthreat detection (CTD) in the recent years. A substantial research effort has been invested in the development of specialized algorithms for CTD tasks. From the operational perspective, however, the progress of ML-based CTD is hindered by the difficulty in obtaining the large sets of labelled data to train ML detectors. A potential so… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  16. arXiv:2203.10166  [pdf, other

    cs.LG cs.CR cs.CV

    Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

    Authors: Johannes Schneider, Giovanni Apruzzese

    Abstract: We propose to generate adversarial samples by modifying activations of upper layers encoding semantically meaningful concepts. The original sample is shifted towards a target sample, yielding an adversarial sample, by using the modified activations to reconstruct the original sample. A human might (and possibly should) notice differences between the original and the adversarial sample. Depending o… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Accepted at IEEE Symposium on Security and Privacy (S&P) Workshop on Deep Learning and Security, 2022

  17. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

    Authors: Giovanni Apruzzese, Luca Pajola, Mauro Conti

    Abstract: Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labelled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying on the same outdated data. The situation improved recent… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

  18. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

    Authors: Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni

    Abstract: The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial attacks that create tiny perturbations aimed at decreasing the effectiveness of detecting threats. We observe that existing literature assumes threat mod… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  19. On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

    Authors: Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese

    Abstract: Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS). Specifically, attention has been given to sequential learning models, due to their ability to extract the temporal characteristics of Network traffic Flows (NetFlows), and use them for NIDS tasks. However, the applications of these sequential models often consist of t… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

  20. Hardening Random Forest Cyber Detectors Against Adversarial Attacks

    Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti

    Abstract: Machine learning algorithms are effective in several applications, but they are not as much successful when applied to intrusion detection in cyber security. Due to the high sensitivity to their training data, cyber detectors based on machine learning are vulnerable to targeted adversarial attacks that involve the perturbation of initial samples. Existing defenses assume unrealistic scenarios; the… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.