Skip to main content

Showing 1–6 of 6 results for author: Ariu, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13547  [pdf, other

    cs.LG

    ModSec-Learn: Boosting ModSecurity with Machine Learning

    Authors: Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set (CRS), identifying well-known attack patterns. Each rule is manually assigned a weight based on the severity of the corresponding attack, and a request is blocked if the sum of the weights of matche… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2308.04964

  2. arXiv:2405.19970  [pdf, other

    cs.AI

    Strategies to Counter Artificial Intelligence in Law Enforcement: Cross-Country Comparison of Citizens in Greece, Italy and Spain

    Authors: Petra Saskia Bayerl, Babak Akhgar, Ernesto La Mattina, Barbara Pirillo, Ioana Cotoi, Davide Ariu, Matteo Mauri, Jorge Garcia, Dimitris Kavallieros, Antonia Kardara, Konstantina Karagiorgou

    Abstract: This paper investigates citizens' counter-strategies to the use of Artificial Intelligence (AI) by law enforcement agencies (LEAs). Based on information from three countries (Greece, Italy and Spain) we demonstrate disparities in the likelihood of ten specific counter-strategies. We further identified factors that increase the propensity for counter-strategies. Our study provides an important new… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 20th International Conference on Information and Knowledge Engineering (IKE'21), 3 papges, 1 figure

    ACM Class: I.2.0; K.4.1

  3. arXiv:2308.04964  [pdf, other

    cs.LG cs.CR

    Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

    Authors: Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set, identifying well-known attack patterns. Each rule in the CRS is manually assigned a weight, based on the severity of the corresponding attack, and a request is detected as malicious if the sum of t… ▽ More

    Submitted 17 August, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

  4. arXiv:1811.09985  [pdf, other

    cs.LG cs.CR stat.ML

    Poisoning Behavioral Malware Clustering

    Authors: Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli

    Abstract: Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems. However, the suitability of clustering algorithms for security-sensitive settings has been recently questioned by showing that they can be significantly compromised if an attacker can exercise some control… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Journal ref: 2014 ACM CCS Workshop on Artificial Intelligent and Security, AISec '14, pages 27-36, New York, NY, USA, 2014. ACM

  5. arXiv:1811.09982  [pdf, ps, other

    cs.LG cs.CR cs.CV stat.ML

    Is Data Clustering in Adversarial Settings Secure?

    Authors: Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli

    Abstract: Clustering algorithms have been increasingly adopted in security applications to spot dangerous or illicit activities. However, they have not been originally devised to deal with deliberate attack attempts that may aim to subvert the clustering process itself. Whether clustering can be safely adopted in such settings remains thus questionable. In this work we propose a general framework that allow… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Journal ref: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, AISec '13, pages 87-98, New York, NY, USA, 2013. ACM

  6. arXiv:1707.00317  [pdf, other

    cs.CR

    DeltaPhish: Detecting Phishing Webpages in Compromised Websites

    Authors: Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli

    Abstract: The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting. To the best of our knowledge, this is the first work that specifically leverages this adversarial behavior for detection purposes. We show that phishing webpages can be accurately detected… ▽ More

    Submitted 2 July, 2017; originally announced July 2017.

    Comments: Preprint version of the work accepted at ESORICS 2017