Skip to main content

Showing 1–12 of 12 results for author: Dubin, R

.
  1. arXiv:2405.11258  [pdf, other

    cs.CR

    Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning

    Authors: Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Web applications and APIs face constant threats from malicious actors seeking to exploit vulnerabilities for illicit gains. These threats necessitate robust anomaly detection systems capable of identifying malicious API traffic efficiently despite limited and diverse datasets. This paper proposes a novel few-shot detection approach motivated by Natural Language Processing (NLP) and advanced Genera… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 8 pages, 2 figures, 7 tables

  2. arXiv:2405.11247  [pdf, other

    cs.CR

    Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework

    Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Application Programming Interface (API) attacks refer to the unauthorized or malicious use of APIs, which are often exploited to gain access to sensitive data or manipulate online systems for illicit purposes. Identifying actors that deceitfully utilize an API poses a demanding problem. Although there have been notable advancements and contributions in the field of API security, there still remain… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 13 pages, 8 figures, 3 tables

  3. arXiv:2403.11206  [pdf, other

    cs.LG cs.CR cs.NI

    CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

    Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Encrypted network traffic Classification tackles the problem from different approaches and with different goals. One of the common approaches is using Machine learning or Deep Learning-based solutions on a fixed number of classes, leading to misclassification when an unknown class is given as input. One of the solutions for handling unknown classes is to retrain the model, however, retraining mode… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    MSC Class: ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: I.2.6

  4. Steganalysis of AI Models LSB Attacks

    Authors: Daniel Gilkarov, Ran Dubin

    Abstract: Artificial intelligence has made significant progress in the last decade, leading to a rise in the popularity of model sharing. The model zoo ecosystem, a repository of pre-trained AI models, has advanced the AI open-source community and opened new avenues for cyber risks. Malicious attackers can exploit shared models to launch cyber-attacks. This work focuses on the steganalysis of injected malic… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  5. arXiv:2309.03071  [pdf, other

    cs.CR cs.MM

    Disarming Steganography Attacks Inside Neural Network Models

    Authors: Ran Dubin

    Abstract: Similar to the revolution of open source code sharing, Artificial Intelligence (AI) model sharing is gaining increased popularity. However, the fast adaptation in the industry, lack of awareness, and ability to exploit the models make them significant attack vectors. By embedding malware in neurons, the malware can be delivered covertly, with minor or no impact on the neural network's performance.… ▽ More

    Submitted 26 September, 2023; v1 submitted 6 September, 2023; originally announced September 2023.

  6. arXiv:2307.14057  [pdf, other

    cs.CR cs.AI

    Open Image Content Disarm And Reconstruction

    Authors: Eli Belkind, Ran Dubin, Amit Dvir

    Abstract: With the advance in malware technology, attackers create new ways to hide their malicious code from antivirus services. One way to obfuscate an attack is to use common files as cover to hide the malicious scripts, so the malware will look like a legitimate file. Although cutting-edge Artificial Intelligence and content signature exist, evasive malware successfully bypasses next-generation malware… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 14 pages

  7. arXiv:2206.10144  [pdf, other

    cs.LG

    Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

    Authors: Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj

    Abstract: Internet traffic classification plays a key role in network visibility, Quality of Services (QoS), intrusion detection, Quality of Experience (QoE) and traffic-trend analyses. In order to improve privacy, integrity, confidentiality, and protocol obfuscation, the current traffic is based on encryption protocols, e.g., SSL/TLS. With the increased use of Machine-Learning (ML) and Deep-Learning (DL) m… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  8. arXiv:2206.08004  [pdf, other

    cs.CR cs.LG

    When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

    Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Internet traffic classification is widely used to facilitate network management. It plays a crucial role in Quality of Services (QoS), Quality of Experience (QoE), network visibility, intrusion detection, and traffic trend analyses. While there is no theoretical guarantee that deep learning (DL)-based solutions perform better than classic machine learning (ML)-based ones, DL-based models have beco… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  9. arXiv:1603.04865  [pdf, ps, other

    cs.CR

    Robust Machine Learning for Encrypted Traffic Classification

    Authors: Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Chen Hajaj, Ran Dubin

    Abstract: Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victims encrypted network traffic in order to identify users para… ▽ More

    Submitted 20 July, 2020; v1 submitted 15 March, 2016; originally announced March 2016.

  10. Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach

    Abstract: The increasing demand for video streaming services with high Quality of Experience (QoE) has prompted a lot of research on client-side adaptation logic approaches. However, most algorithms use the client's previous download experience and do not use a crowd knowledge database generated by users of a professional service. We propose a new crowd algorithm that maximizes the QoE. Additionally, we sho… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: 10 pages

  11. I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar

    Abstract: Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the Internet traffic is encrypted and thus passive attac… ▽ More

    Submitted 21 July, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages. arXiv admin note: text overlap with arXiv:1602.00489

    Journal ref: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 12, DECEMBER 2017

  12. arXiv:1602.00489  [pdf, ps, other

    cs.MM cs.CR cs.LG cs.NI

    Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Richman, Ofir Trabelsi

    Abstract: The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in sha** their encrypted video traffic… ▽ More

    Submitted 19 February, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages