Skip to main content

Showing 1–17 of 17 results for author: Dvir, A

.
  1. arXiv:2405.11258  [pdf, other

    cs.CR

    Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning

    Authors: Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Web applications and APIs face constant threats from malicious actors seeking to exploit vulnerabilities for illicit gains. These threats necessitate robust anomaly detection systems capable of identifying malicious API traffic efficiently despite limited and diverse datasets. This paper proposes a novel few-shot detection approach motivated by Natural Language Processing (NLP) and advanced Genera… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 8 pages, 2 figures, 7 tables

  2. arXiv:2405.11247  [pdf, other

    cs.CR

    Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework

    Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Application Programming Interface (API) attacks refer to the unauthorized or malicious use of APIs, which are often exploited to gain access to sensitive data or manipulate online systems for illicit purposes. Identifying actors that deceitfully utilize an API poses a demanding problem. Although there have been notable advancements and contributions in the field of API security, there still remain… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 13 pages, 8 figures, 3 tables

  3. arXiv:2403.11206  [pdf, other

    cs.LG cs.CR cs.NI

    CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

    Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Encrypted network traffic Classification tackles the problem from different approaches and with different goals. One of the common approaches is using Machine learning or Deep Learning-based solutions on a fixed number of classes, leading to misclassification when an unknown class is given as input. One of the solutions for handling unknown classes is to retrain the model, however, retraining mode… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    MSC Class: ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 ACM-class: I.2.6

  4. arXiv:2307.14057  [pdf, other

    cs.CR cs.AI

    Open Image Content Disarm And Reconstruction

    Authors: Eli Belkind, Ran Dubin, Amit Dvir

    Abstract: With the advance in malware technology, attackers create new ways to hide their malicious code from antivirus services. One way to obfuscate an attack is to use common files as cover to hide the malicious scripts, so the malware will look like a legitimate file. Although cutting-edge Artificial Intelligence and content signature exist, evasive malware successfully bypasses next-generation malware… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 14 pages

  5. arXiv:2206.10144  [pdf, other

    cs.LG

    Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

    Authors: Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj

    Abstract: Internet traffic classification plays a key role in network visibility, Quality of Services (QoS), intrusion detection, Quality of Experience (QoE) and traffic-trend analyses. In order to improve privacy, integrity, confidentiality, and protocol obfuscation, the current traffic is based on encryption protocols, e.g., SSL/TLS. With the increased use of Machine-Learning (ML) and Deep-Learning (DL) m… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  6. arXiv:2206.08004  [pdf, other

    cs.CR cs.LG

    When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

    Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj

    Abstract: Internet traffic classification is widely used to facilitate network management. It plays a crucial role in Quality of Services (QoS), Quality of Experience (QoE), network visibility, intrusion detection, and traffic trend analyses. While there is no theoretical guarantee that deep learning (DL)-based solutions perform better than classic machine learning (ML)-based ones, DL-based models have beco… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  7. arXiv:2205.14576  [pdf, other

    cs.CR

    Problem-Space Evasion Attacks in the Android OS: a Survey

    Authors: Harel Berger, Chen Hajaj, Amit Dvir

    Abstract: Android is the most popular OS worldwide. Therefore, it is a target for various kinds of malware. As a countermeasure, the security community works day and night to develop appropriate Android malware detection systems, with ML-based or DL-based systems considered as some of the most common types. Against these detection systems, intelligent adversaries develop a wide set of evasion attacks, in wh… ▽ More

    Submitted 21 June, 2022; v1 submitted 29 May, 2022; originally announced May 2022.

  8. arXiv:2205.04293  [pdf, other

    cs.CR

    Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

    Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen

    Abstract: Android malware is a spreading disease in the virtual world. Anti-virus and detection systems continuously undergo patches and updates to defend against these threats. Most of the latest approaches in malware detection use Machine Learning (ML). Against the robustifying effort of detection systems, raise the \emph{evasion attacks}, where an adversary changes its targeted samples so that they are m… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  9. arXiv:2202.13922  [pdf, ps, other

    cs.CR cs.LG

    MaMaDroid2.0 -- The Holes of Control Flow Graphs

    Authors: Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir

    Abstract: Android malware is a continuously expanding threat to billions of mobile users around the globe. Detection systems are updated constantly to address these threats. However, a backlash takes the form of evasion attacks, in which an adversary changes malicious samples such that those samples will be misclassified as benign. This paper fully inspects a well-known Android malware detection system, MaM… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  10. arXiv:2006.01449  [pdf, other

    cs.CR

    Less is More: Robust and Novel Features for Malicious Domain Detection

    Authors: Chen Hajaj, Nitay Hason, Nissim Harel, Amit Dvir

    Abstract: Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many types of current cyber attacks use URLs for attack communications (e.g., C\&C, phishing, and spear-phishing). Despite the continuous progress in detecting these attacks, many alarming problems remain open, such as the weak spots of the defense mechanisms. Since machine learning has become one of th… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: 30 pages, 7 figures, 10 tables

  11. arXiv:2006.01206  [pdf, other

    cs.CL cs.SD eess.AS

    A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection

    Authors: O. H. Anidjar, C. Hajaj, A. Dvir, I. Gilad

    Abstract: Speaker Diarization (SD) consists of splitting or segmenting an input audio burst according to speaker identities. In this paper, we focus on the crucial task of the SD problem which is the audio segmenting process and suggest a solution for the Change Point Detection (CPD) problem. We empirically demonstrate the negative correlation between an increase in the number of speakers and the Recall and… ▽ More

    Submitted 18 May, 2020; originally announced June 2020.

    Comments: 30 pages, 8 Figures, and 6 Tables

  12. arXiv:2003.14123  [pdf, other

    cs.CR

    When the Guard failed the Droid: A case study of Android malware

    Authors: Harel Berger, Chen Hajaj, Amit Dvir

    Abstract: Android malware is a persistent threat to billions of users around the world. As a countermeasure, Android malware detection systems are occasionally implemented. However, these systems are often vulnerable to \emph{evasion attacks}, in which an adversary manipulates malicious instances so that they are misidentified as benign. In this paper, we launch various innovative evasion attacks against se… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  13. arXiv:1906.10928  [pdf, other

    cs.CR

    A wrinkle in time: A case study in DNS poisoning

    Authors: Harel Berger, Amit Z. Dvir, Moti Geva

    Abstract: The Domain Name System (DNS) provides a translation between readable domain names and IP addresses. The DNS is a key infrastructure component of the Internet and a prime target for a variety of attacks. One of the most significant threat to the DNS's wellbeing is a DNS poisoning attack, in which the DNS responses are maliciously replaced, or poisoned, by an attacker. To identify this kind of attac… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  14. arXiv:1603.04865  [pdf, ps, other

    cs.CR

    Robust Machine Learning for Encrypted Traffic Classification

    Authors: Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Chen Hajaj, Ran Dubin

    Abstract: Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victims encrypted network traffic in order to identify users para… ▽ More

    Submitted 20 July, 2020; v1 submitted 15 March, 2016; originally announced March 2016.

  15. Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach

    Abstract: The increasing demand for video streaming services with high Quality of Experience (QoE) has prompted a lot of research on client-side adaptation logic approaches. However, most algorithms use the client's previous download experience and do not use a crowd knowledge database generated by users of a professional service. We propose a new crowd algorithm that maximizes the QoE. Additionally, we sho… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: 10 pages

  16. I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar

    Abstract: Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the Internet traffic is encrypted and thus passive attac… ▽ More

    Submitted 21 July, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages. arXiv admin note: text overlap with arXiv:1602.00489

    Journal ref: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 12, DECEMBER 2017

  17. arXiv:1602.00489  [pdf, ps, other

    cs.MM cs.CR cs.LG cs.NI

    Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

    Authors: Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Richman, Ofir Trabelsi

    Abstract: The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in sha** their encrypted video traffic… ▽ More

    Submitted 19 February, 2016; v1 submitted 1 February, 2016; originally announced February 2016.

    Comments: 9 pages