4.6 Article

Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An improved model for detecting DGA botnets using random forest algorithm

Xuan Dau Hoang et al.

Summary: The paper discusses the issue of detecting DGA botnets and proposes an improved machine learning-based detection model with new domain classification features to reduce false alarm rates and increase detection accuracy. Extensive experiments demonstrate that the proposed model outperforms previous models with a false alarm rate of less than 3.02% and an overall detection accuracy and F1-score of 97.03%.

INFORMATION SECURITY JOURNAL (2022)

Article Computer Science, Information Systems

Explainable Artificial Intelligence: Objectives, Stakeholders, and Future Research Opportunities

Christian Meske et al.

Summary: Artificial Intelligence (AI) has permeated many aspects of our lives, and this research note discusses the risks of black-box AI, the need for explainability, and previous research on Explainable AI (XAI) in information systems research. The note also explores the origin, objectives, stakeholders, and quality criteria of personalized explanations in XAI, and concludes with an outlook on future XAI research.

INFORMATION SYSTEMS MANAGEMENT (2022)

Review Computer Science, Artificial Intelligence

A historical perspective of explainable Artificial Intelligence

Roberto Confalonieri et al.

Summary: Explainability in Artificial Intelligence has become an active area of research due to the need for conveying safety and trust to users in automated decision-making. While this topic has recently gained attention, its origins can be traced back several decades to the development of expert systems. Research on explainability has been explored in various fields over different periods of AI history, leading to a historical perspective presented in this article. The criteria for explanations proposed in the conclusion are believed to be crucial for the development of human-understandable explainable systems.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2021)

Article Engineering, Electrical & Electronic

A Comprehensive Survey on Transfer Learning

Fuzhen Zhuang et al.

Summary: Transfer learning aims to improve the performance of target learners by transferring knowledge from related source domains, reducing the reliance on target-domain data. This survey aims to systematize and summarize existing research studies in order to help readers understand the current status and ideas in the area of transfer learning.

PROCEEDINGS OF THE IEEE (2021)

Article Computer Science, Information Systems

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

Constantinos Patsakis et al.

COMPUTERS & SECURITY (2020)

Review Computer Science, Artificial Intelligence

A review of privacy-preserving techniques for deep learning

Amine Boulemtafes et al.

NEUROCOMPUTING (2020)

Article Computer Science, Artificial Intelligence

Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI

Alejandro Barredo Arrieta et al.

INFORMATION FUSION (2020)

Article Computer Science, Information Systems

Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey

Harry Chandra Tanuwidjaja et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses

Lior Sidi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Under false flag: using technical artifacts for cyber attack attribution

Florian Skopik et al.

CYBERSECURITY (2020)

Article Computer Science, Information Systems

An analysis and classification of public information security data sources used in research and practice

Clemens Sauerwein et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Issues and challenges in DNS based botnet detection: A survey

Manmeet Singh et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Clustering Malicious DNS Queries for Blacklist-Based Detection

Akihiro Satoh et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2019)

Article Computer Science, Information Systems

Cyber threat intelligence sharing: Survey and research directions

Thomas D. Wagner et al.

COMPUTERS & SECURITY (2019)

Article Telecommunications

Malicious Domain Names Detection Algorithm Based on N-Gram

Hong Zhao et al.

JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2019)

Proceedings Paper Computer Science, Information Systems

Sharing Cyber Threat Intelligence Under the General Data Protection Regulation

Adham Albakri et al.

PRIVACY TECHNOLOGIES AND POLICY, APF 2019 (2019)

Proceedings Paper Computer Science, Theory & Methods

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning

Giovanni Apruzzese et al.

2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE (2019)

Article Computer Science, Information Systems

CharBot: A Simple and Effective Method for Evading DGA Classifiers

Jonathan Peck et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A survey on technical threat intelligence in the age of sophisticated cyber attacks

Wiem Tounsi et al.

COMPUTERS & SECURITY (2018)

Article Automation & Control Systems

A Reliability Comparison Method for OSINT Validity Analysis

Seonghyeon Gong et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Artificial Intelligence

Wild patterns: Ten years after the rise of adversarial machine learning

Battista Biggio et al.

PATTERN RECOGNITION (2018)

Article Computer Science, Information Systems

A Novel Trust Taxonomy for Shared Cyber Threat Intelligence

Thomas D. Wagner et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)

Amina Adadi et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

A Bibliometric Analysis of the Explainable Artificial Intelligence Research Field

Jose M. Alonso et al.

INFORMATION PROCESSING AND MANAGEMENT OF UNCERTAINTY IN KNOWLEDGE-BASED SYSTEMS: THEORY AND FOUNDATIONS, IPMU 2018, PT I (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Explainable AI: The New 42?

Randy Goebel et al.

MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2018 (2018)

Review Computer Science, Artificial Intelligence

A survey of botnet detection based on DNS

Kamal Alieyan et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Article Computer Science, Information Systems

DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis

Tzy-Shiah Wang et al.

COMPUTERS & SECURITY (2017)

Proceedings Paper Computer Science, Artificial Intelligence

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Hyrum S. Anderson et al.

AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY (2016)

Article Computer Science, Information Systems

On the ground truth problem of malicious DNS traffic analysis

Matija Stevanovic et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic

Reza Sharifnya et al.

DIGITAL INVESTIGATION (2015)

Article Computer Science, Hardware & Architecture

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis

Sandeep Yadav et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2012)

Article Ethics

Explanation and trust: what to tell the user in security and AI?

Wolter Pieters

ETHICS AND INFORMATION TECHNOLOGY (2011)