Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–12 of 12 results for author: Morla, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.00943  [pdf, other

    cs.CR cs.LG cs.NI

    Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

    Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla

    Abstract: Command and Control (C2) communication is a key component of any structured cyber-attack. As such, security operations actively try to detect this type of communication in their networks. This poses a problem for legitimate pentesters that try to remain undetected, since commonly used pentesting tools, such as Metasploit, generate constant traffic patterns that are easily distinguishable from regu… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  2. Flow-based detection and proxy-based evasion of encrypted malware C2 traffic

    Authors: Carlos Novo, Ricardo Morla

    Abstract: State of the art deep learning techniques are known to be vulnerable to evasion attacks where an adversarial sample is generated from a malign sample and misclassified as benign. Detection of encrypted malware command and control traffic based on TCP/IP flow features can be framed as a learning task and is thus vulnerable to evasion attacks. However, unlike e.g. in image processing where generated… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: 9 pages, 6 figures

  3. arXiv:1912.06817  [pdf, ps, other

    cs.CR cs.AI

    Ten AI Stepping Stones for Cybersecurity

    Authors: Ricardo Morla

    Abstract: With the turmoil in cybersecurity and the mind-blowing advances in AI, it is only natural that cybersecurity practitioners consider further employing learning techniques to help secure their organizations and improve the efficiency of their security operation centers. But with great fears come great opportunities for both the good and the evil, and a myriad of bad deals. This paper discusses ten i… ▽ More

    Submitted 14 December, 2019; originally announced December 2019.

  4. arXiv:1710.03040  [pdf, other

    cs.DC

    Run Time Prediction for Big Data Iterative ML Algorithms: a KMeans case study

    Authors: Eduardo Rodrigues, Ricardo Morla

    Abstract: Data science and machine learning algorithms running on big data infrastructure are increasingly important in activities ranging from business intelligence and analytics to cybersecurity, smart city management, and many fields of science and engineering. As these algorithms are further integrated into daily operations, understanding how long they take to run on a big data infrastructure is paramou… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

  5. arXiv:1708.03453  [pdf, other

    cs.NI

    A Framework for BGP Abnormal Events Detection

    Authors: Anisa Allahdadi, Ricardo Morla, Rui Prior

    Abstract: Detection of abnormal BGP events is of great importance to preserve the security and robustness of the Internet inter-domain routing system. In this paper, we propose an anomaly detection framework based on machine learning techniques to identify the anomalous events by training a model for normal BGP-updates and measuring the extent of deviation from the normal model during the abnormal occasions… ▽ More

    Submitted 11 August, 2017; originally announced August 2017.

  6. arXiv:1707.02933  [pdf, other

    cs.NI

    802.11 Wireless Simulation and Anomaly Detection using HMM and UBM

    Authors: Anisa Allahdadi, Ricardo Morla, Jaime S. Cardoso

    Abstract: Despite the growing popularity of 802.11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior among other reasons. Anomaly detection and distinction are in the thick of major challenges that network managers encounter. Complication of monitoring the broaden and complex WLANs, that often requires heavy ins… ▽ More

    Submitted 29 August, 2018; v1 submitted 10 July, 2017; originally announced July 2017.

  7. Anomaly Detection and Modeling in 802.11 Wireless Networks

    Authors: Anisa Allahdadi, Ricardo Morla

    Abstract: IEEE 802.11 Wireless Networks are getting more and more popular at university campuses, enterprises, shopping centers, airports and in so many other public places, providing Internet access to a large crowd openly and quickly. The wireless users are also getting more dependent on WiFi technology and therefore demanding more reliability and higher performance for this vital technology. However, due… ▽ More

    Submitted 4 July, 2017; originally announced July 2017.

  8. arXiv:1707.00641  [pdf, other

    cs.CR

    Effect of Pipelining and Multiplexing in Estimating HTTP/2.0 Web Object Sizes

    Authors: Ricardo Morla

    Abstract: HTTP response size is a well-known side channel attack. With the deployment of HTTP/2.0, response size estimation attacks are generally dismissed with the argument that pipelining and response multiplexing prevent eavesdroppers from finding out response sizes. Yet the impact that pipelining and response multiplexing actually have in estimating HTTP response sizes has not been adequately investigat… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

  9. arXiv:1607.06709  [pdf, other

    cs.CR cs.NI

    An initial study of the effect of pipelining in hiding HTTP/2.0 response sizes

    Authors: Ricardo Morla

    Abstract: HTTP response size is a well-known side channel attack. With the deployment of HTTP/2.0, response size attacks are generally dismissed with the argument that pipelining and response multiplexing prevent eavesdroppers from finding out response sizes. Yet the extent to which pipelining and response multiplexing actually hide HTTP response sizes has not been adequately investigated. In this paper we… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

  10. arXiv:1509.08647  [pdf, other

    cs.CV

    Long-Range Trajectories from Global and Local Motion Representations

    Authors: Eduardo M. Pereira, Jaime S. Cardoso, Ricardo Morla

    Abstract: Motion is a fundamental cue for scene analysis and human activity understan- ding in videos. It can be encoded in trajectories for tracking objects and for action recognition, or in form of flow to address behaviour analysis in crowded scenes. Each approach can only be applied on limited scenarios. We propose a motion-based system that represents the spatial and temporal features of the flow in te… ▽ More

    Submitted 29 September, 2015; originally announced September 2015.

  11. arXiv:1509.04203  [pdf, other

    cs.NI

    Power Interference Modeling for CSMA/CA based Networks using Directional Antenna

    Authors: Saravanan Kandasamy, Ricardo Morla, Manuel Ricardo

    Abstract: In IEEE 802.11 based wireless networks adding more access points does not always guarantee an increase of network capacity. In some cases, additional access points may contribute to degrade the aggregated network throughput as more interference is introduced. This paper characterizes the power interference in CSMA/CA based networks consisting of nodes using directional antenna. The severity of t… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.

    Comments: Submitted to Elsevier's Journal of Computer Communications, 40 pages, 17 figures and 25 references

  12. arXiv:1406.3266  [pdf, other

    cs.AI

    Event and Anomaly Detection Using Tucker3 Decomposition

    Authors: Hadi Fanaee-T, Márcia D. B. Oliveira, João Gama, Simon Malinowski, Ricardo Morla

    Abstract: Failure detection in telecommunication networks is a vital task. So far, several supervised and unsupervised solutions have been provided for discovering failures in such networks. Among them unsupervised approaches has attracted more attention since no label data is required. Often, network devices are not able to provide information about the type of failure. In such cases the type of failure is… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Journal ref: In Proceedings of 20th European Conference on Artificial Intelligence (ECAI'2013)- Ubiquitous Data Mining Workshop, pp. 8-12, vol. 1, August 27-31, 2012