no code implementations • 6 Dec 2023 • Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp
In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work.
no code implementations • 17 Jul 2023 • Aditya Raghavan, Fabio Di Troia, Mark Stamp
One machine learning technique that has been used widely in the field of pattern matching in general-and malware detection in particular-is hidden Markov models (HMMs).
1 code implementation • 23 Jun 2023 • Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia
Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results.
no code implementations • 1 May 2023 • Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz
Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families.
no code implementations • 27 Jun 2022 • Samanvitha Basole, Fabio Di Troia, Mark Stamp
When training a machine learning model, there is likely to be a tradeoff between accuracy and the diversity of the dataset.
no code implementations • 8 Jun 2022 • Andrew Miller, Fabio Di Troia, Mark Stamp
In this research, we experiment with adding momentum to the Baum-Welch expectation-maximization algorithm for training Hidden Markov Models.
no code implementations • 8 Jun 2022 • Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp
We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection.
no code implementations • 2 Apr 2022 • Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp
In this research, we consider the problem of image spam detection, based on image analysis.
no code implementations • 13 Mar 2022 • Anusha Damodaran, Fabio Di Troia, Visaggio Aaron Corrado, Thomas H. Austin, Mark Stamp
In this research, we compare malware detection techniques based on static, dynamic, and hybrid analysis.
no code implementations • 3 Oct 2021 • Elliu Huang, Fabio Di Troia, Mark Stamp
Although prior research has shown that deep learning models are vulnerable to adversarial attacks, relatively little research has been done in the adversarial domain for behavioral biometrics.
no code implementations • 26 Jul 2021 • Ruchira Gothankar, Fabio Di Troia, Mark Stamp
YouTube videos often include captivating descriptions and intriguing thumbnails designed to increase the number of views, and thereby increase the revenue for the person who posted the video.
no code implementations • 7 Mar 2021 • Zidong Jiang, Fabio Di Troia, Mark Stamp
We employ the resulting techniques to develop and test a sentiment analysis approach for troll detection, based on a variety of machine learning strategies.
no code implementations • 3 Mar 2021 • Dennis Dang, Fabio Di Troia, Mark Stamp
We find that a model consisting of word embedding, biLSTMs, and CNN layers performs best in our malware classification experiments.
no code implementations • 3 Mar 2021 • Aparna Sunil Kale, Fabio Di Troia, Mark Stamp
Malware classification is an important and challenging problem in information security.
1 code implementation • 21 Jan 2019 • Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp
In this paper, we consider the problem of malware detection and classification based on image analysis.
no code implementations • 21 Jan 2019 • Neeraj Chavan, Fabio Di Troia, Mark Stamp
In this paper, we present a comparative analysis of benign and malicious Android applications, based on static features.
no code implementations • 6 Jan 2019 • Swapna Vemparala, Fabio Di Troia, Corrado A. Visaggio, Thomas H. Austin, Mark Stamp
In this paper, we explore the effectiveness of dynamic analysis techniques for identifying malware, using Hidden Markov Models (HMMs) and Profile Hidden Markov Models (PHMMs), both trained on sequences of API calls.