Skip to main content

Showing 1–7 of 7 results for author: Laskov, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.00550  [pdf, other

    cs.CR cs.LG cs.NI

    SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

    Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider

    Abstract: Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For Network Intrusion Detection (NID), however, scientific advances in ML are still seen with skepticism by practitioners. This disconnection is due to the intrinsically limited scope of research papers, many of which primarily aim to demonstrate new methods ``outperforming'' prior work -- oftentimes overlooking the… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  2. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

    Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov

    Abstract: Fifth Generation (5G) networks must support billions of heterogeneous devices while guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet with human effort alone, and Machine Learning (ML) represents a core asset in 5G. ML, however, is known to be vulnerable to adversarial examples; moreover, as our paper will show, the 5G context is exposed to a yet another type… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  3. arXiv:2206.09707  [pdf, other

    cs.CR cs.LG

    The Role of Machine Learning in Cybersecurity

    Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco

    Abstract: Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such discrepancy has its root cause in the current state-of-the-art, which does not allow to identify the… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

  4. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

    Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova

    Abstract: Machine learning (ML) has become an important paradigm for cyberthreat detection (CTD) in the recent years. A substantial research effort has been invested in the development of specialized algorithms for CTD tasks. From the operational perspective, however, the progress of ML-based CTD is hindered by the difficulty in obtaining the large sets of labelled data to train ML detectors. A potential so… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  5. arXiv:2204.13793  [pdf, other

    cs.CR

    Towards Understanding the Skill Gap in Cybersecurity

    Authors: Francois Goupil, Pavel Laskov, Irdin Pekaric, Michael Felderer, Alexander Dürr, Frederic Thiesse

    Abstract: Given the ongoing "arms race" in cybersecurity, the shortage of skilled professionals in this field is one of the strongest in computer science. The currently unmet staffing demand in cybersecurity is estimated at over 3 million jobs worldwide. Furthermore, the qualifications of the existing workforce are largely believed to be insufficient. We attempt to gain deeper insights into the nature of th… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

  6. Evasion Attacks against Machine Learning at Test Time

    Authors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli

    Abstract: In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present a simple but effective gradient-based approach that can be exploited to systema… ▽ More

    Submitted 21 August, 2017; originally announced August 2017.

    Comments: In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimum-distance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely re-used in develo** attacks against deep networks (even if not always referring to the ideas reported in this work). arXiv admin note: text overlap with arXiv:1401.7727

    Journal ref: ECML PKDD, Part III, vol. 8190, LNCS, pp. 387--402. Springer, 2013

  7. arXiv:1206.6389  [pdf, other

    cs.LG cs.CR stat.ML

    Poisoning Attacks against Support Vector Machines

    Authors: Battista Biggio, Blaine Nelson, Pavel Laskov

    Abstract: We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such attacks inject specially crafted training data that increases the SVM's test error. Central to the motivation for these attacks is the fact that most learning algorithms assume that their training data comes from a natural or well-behaved distribution. However, this assumption does not generally hold in securi… ▽ More

    Submitted 25 March, 2013; v1 submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the 29th International Conference on Machine Learning (ICML 2012)