Skip to main content

Showing 1–3 of 3 results for author: Hoang, H D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.15518  [pdf, other

    cs.CR cs.AI

    Raijū: Reinforcement Learning-Guided Post-Exploitation for Automating Security Assessment of Network Systems

    Authors: Van-Hau Pham, Hien Do Hoang, Phan Thanh Trung, Van Dinh Quoc, Trong-Nghia To, Phan The Duy

    Abstract: In order to assess the risks of a network system, it is important to investigate the behaviors of attackers after successful exploitation, which is called post-exploitation. Although there are various efficient tools supporting post-exploitation implementation, no application can automate this process. Most of the steps of this process are completed by experts who have profound knowledge of securi… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  2. arXiv:2309.13841  [pdf, other

    cs.CR cs.LG

    On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors

    Authors: Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham

    Abstract: Recently, there has been a growing focus and interest in applying machine learning (ML) to the field of cybersecurity, particularly in malware detection and prevention. Several research works on malware analysis have been proposed, offering promising results for both academic and practical applications. In these works, the use of Generative Adversarial Networks (GANs) or Reinforcement Learning (RL… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

  3. B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain

    Authors: Phan The Duy, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham

    Abstract: Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element. Even though it brings several benefits, SDN is vulnerable to a diversity of attacks. Abusing the single point of failure in the SDN controller component, hackers can shut down all network operation… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 23 pages, 14 figures, 14 tables

    Report number: Volume 64, February 2022

    Journal ref: Journal of Information Security and Applications, 2022