Skip to main content

Showing 1–5 of 5 results for author: Piras, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13547  [pdf, other

    cs.LG

    ModSec-Learn: Boosting ModSecurity with Machine Learning

    Authors: Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set (CRS), identifying well-known attack patterns. Each rule is manually assigned a weight based on the severity of the corresponding attack, and a request is blocked if the sum of the weights of matche… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2308.04964

  2. arXiv:2308.04964  [pdf, other

    cs.LG cs.CR

    Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

    Authors: Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio

    Abstract: ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set, identifying well-known attack patterns. Each rule in the CRS is manually assigned a weight, based on the severity of the corresponding attack, and a request is detected as malicious if the sum of t… ▽ More

    Submitted 17 August, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

  3. arXiv:1707.00317  [pdf, other

    cs.CR

    DeltaPhish: Detecting Phishing Webpages in Compromised Websites

    Authors: Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli

    Abstract: The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting. To the best of our knowledge, this is the first work that specifically leverages this adversarial behavior for detection purposes. We show that phishing webpages can be accurately detected… ▽ More

    Submitted 2 July, 2017; originally announced July 2017.

    Comments: Preprint version of the work accepted at ESORICS 2017

  4. arXiv:1005.4115  [pdf, ps, other

    cs.CC cs.MA

    Bucklin Voting is Broadly Resistant to Control

    Authors: Gábor Erdélyi, Lena Piras, Jörg Rothe

    Abstract: Electoral control models ways of changing the outcome of an election via such actions as adding/deleting/partitioning either candidates or voters. These actions modify an election's participation structure and aim at either making a favorite candidate win ("constructive control") or prevent a despised candidate from winning ("destructive control"), which yields a total of 22 standard control scena… ▽ More

    Submitted 22 May, 2010; originally announced May 2010.

    Comments: 20 pages

  5. arXiv:1004.3398  [pdf, ps, other

    cs.GT cs.CC

    Control Complexity in Fallback Voting

    Authors: Gábor Erdélyi, Lena Piras, Jörg Rothe

    Abstract: We study the control complexity of fallback voting. Like manipulation and bribery, electoral control describes ways of changing the outcome of an election; unlike manipulation or bribery attempts, control actions---such as adding/deleting/partitioning either candidates or voters---modify the participative structure of an election. Via such actions one can try to either make a favorite candidate w… ▽ More

    Submitted 20 April, 2010; originally announced April 2010.

    Comments: 30 pages