Skip to main content

Showing 1–8 of 8 results for author: Duy, P T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.15518  [pdf, other

    cs.CR cs.AI

    Raijū: Reinforcement Learning-Guided Post-Exploitation for Automating Security Assessment of Network Systems

    Authors: Van-Hau Pham, Hien Do Hoang, Phan Thanh Trung, Van Dinh Quoc, Trong-Nghia To, Phan The Duy

    Abstract: In order to assess the risks of a network system, it is important to investigate the behaviors of attackers after successful exploitation, which is called post-exploitation. Although there are various efficient tools supporting post-exploitation implementation, no application can automate this process. Most of the steps of this process are completed by experts who have profound knowledge of securi… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  2. arXiv:2309.14677  [pdf, other

    cs.CR cs.AI

    XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection

    Authors: Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, Phan The Duy, Van-Hau Pham

    Abstract: With the advancement of deep learning (DL) in various fields, there are many attempts to reveal software vulnerabilities by data-driven approach. Nonetheless, such existing works lack the effective representation that can retain the non-sequential semantic characteristics and contextual relationship of source code attributes. Hence, in this work, we propose XGV-BERT, a framework that combines the… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

  3. arXiv:2309.13841  [pdf, other

    cs.CR cs.LG

    On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors

    Authors: Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham

    Abstract: Recently, there has been a growing focus and interest in applying machine learning (ML) to the field of cybersecurity, particularly in malware detection and prevention. Several research works on malware analysis have been proposed, offering promising results for both academic and practical applications. In these works, the use of Generative Adversarial Networks (GANs) or Reinforcement Learning (RL… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

  4. arXiv:2309.11053  [pdf, other

    cs.CR

    Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection

    Authors: Tran Duc Luong, Vuong Minh Tien, Nguyen Huu Quyen, Do Thi Thu Hien, Phan The Duy, Van-Hau Pham

    Abstract: The significant rise of security concerns in conventional centralized learning has promoted federated learning (FL) adoption in building intelligent applications without privacy breaches. In cybersecurity, the sensitive data along with the contextual information and high-quality labeling in each enterprise organization play an essential role in constructing high-performance machine learning (ML) m… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  5. arXiv:2309.08485  [pdf, other

    cs.CR cs.AI

    XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN

    Authors: Huynh Thai Thi, Ngo Duc Hoang Son, Phan The Duy, Nghi Hoang Khoa, Khoa Ngo-Khanh, Van-Hau Pham

    Abstract: Advanced Persistent Threat (APT) attacks are highly sophisticated and employ a multitude of advanced methods and techniques to target organizations and steal sensitive and confidential information. APT attacks consist of multiple stages and have a defined strategy, utilizing new and innovative techniques and technologies developed by hackers to evade security software monitoring. To effectively pr… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  6. arXiv:2309.08474  [pdf, other

    cs.CR cs.AI

    VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model

    Authors: Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham

    Abstract: This paper presents VulnSense framework, a comprehensive approach to efficiently detect vulnerabilities in Ethereum smart contracts using a multimodal learning approach on graph-based and natural language processing (NLP) models. Our proposed framework combines three types of features from smart contracts comprising source code, opcode sequences, and control flow graph (CFG) extracted from bytecod… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  7. B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain

    Authors: Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham

    Abstract: Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element. Even though it brings several benefits, SDN is vulnerable to a diversity of attacks. Abusing the single point of failure in the SDN controller component, hackers can shut down all network operation… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 23 pages, 14 figures, 14 tables

    Report number: Volume 64, February 2022

    Journal ref: Journal of Information Security and Applications, 2022

  8. arXiv:2009.00530  [pdf

    cs.CR

    A survey on Blockchain-based applications for reforming data protection, privacy and security

    Authors: Phan The Duy, Do Thi Thu Hien, Van-Hau Pham

    Abstract: The modern society, economy and industry have been changed remarkably by many cutting-edge technologies over the last years, and many more are in development and early implementation that will in turn led even wider spread of adoptions and greater alteration. Blockchain technology along with other rising ones is expected to transform virtually every aspect of global business and individuals' lifes… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

    Comments: 8 pages, 2 figures