Skip to main content

Showing 1–9 of 9 results for author: Catania, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.21633  [pdf, other

    cs.NI cs.GT cs.MA

    Static and Repeated Cooperative Games for the Optimization of the AoI in IoT Networks

    Authors: David Emanuele Corrado Raphael Catania, Alessandro Buratto, Giovanni Perin

    Abstract: Wireless sensing and the internet of things (IoT) are nowadays pervasive in 5G and beyond networks, and they are expected to play a crucial role in 6G. However, a centralized optimization of a distributed system is not always possible and cost-efficient. In this paper, we analyze a setting in which two sensors collaboratively update a common server seeking to minimize the age of information (AoI)… ▽ More

    Submitted 12 May, 2025; v1 submitted 27 March, 2025; originally announced March 2025.

    Comments: Accepted to MedComNet 2025 (Cagliari, June 2025). 6 pages, 7 figures

  2. arXiv:2411.03307  [pdf, other

    cs.CL cs.CR

    LLMs for Domain Generation Algorithm Detection

    Authors: Reynier Leyva La O, Carlos A. Catania, Tatiana Parlanti

    Abstract: This work analyzes the use of large language models (LLMs) for detecting domain generation algorithms (DGAs). We perform a detailed evaluation of two important techniques: In-Context Learning (ICL) and Supervised Fine-Tuning (SFT), showing how they can improve detection. SFT increases performance by using domain-specific data, whereas ICL helps the detection model to quickly adapt to new threats w… ▽ More

    Submitted 5 November, 2024; originally announced November 2024.

  3. arXiv:2409.11276  [pdf, other

    cs.CR

    Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments

    Authors: Maria Rigaki, Carlos Catania, Sebastian Garcia

    Abstract: Large Language Models (LLMs) have shown remarkable potential across various domains, including cybersecurity. Using commercial cloud-based LLMs may be undesirable due to privacy concerns, costs, and network connectivity constraints. In this paper, we present Hackphyr, a locally fine-tuned LLM to be used as a red-team agent within network security environments. Our fine-tuned 7 billion parameter mo… ▽ More

    Submitted 17 September, 2024; originally announced September 2024.

  4. arXiv:2404.01940  [pdf, other

    cs.CL

    Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation

    Authors: Veronica Valeros, Anna Širokova, Carlos Catania, Sebastian Garcia

    Abstract: Understanding cybercrime communications is paramount for cybersecurity defence. This often involves translating communications into English for processing, interpreting, and generating timely intelligence. The problem is that translation is hard. Human translation is slow, expensive, and scarce. Machine translation is inaccurate and biased. We propose using fine-tuned Large Language Models (LLM) t… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 9 pages, 4 figures

  5. LLM in the Shell: Generative Honeypots

    Authors: Muris Sladić, Veronica Valeros, Carlos Catania, Sebastian Garcia

    Abstract: Honeypots are essential tools in cybersecurity for early detection, threat intelligence gathering, and analysis of attacker's behavior. However, most of them lack the required realism to engage and fool human attackers long-term. Being easy to distinguish honeypots strongly hinders their effectiveness. This can happen because they are too deterministic, lack adaptability, or lack deepness. This wo… ▽ More

    Submitted 23 September, 2024; v1 submitted 31 August, 2023; originally announced September 2023.

    Comments: 6 pages. 2 figures. 2 tables

  6. arXiv:2308.12086  [pdf, other

    cs.CR cs.AI cs.CL

    Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments

    Authors: Maria Rigaki, Ondřej Lukáš, Carlos A. Catania, Sebastian Garcia

    Abstract: Large Language Models (LLMs) have gained widespread popularity across diverse domains involving text generation, summarization, and various natural language processing tasks. Despite their inherent limitations, LLM-based designs have shown promising capabilities in planning and navigating open-world scenarios. This paper introduces a novel application of pre-trained LLMs as agents within cybersecu… ▽ More

    Submitted 28 August, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

    Comments: Under review. 10 pages plus appendices, 7 figures, 4 tables. Edit: fix e-mails and code repository

  7. arXiv:2209.03346  [pdf, other

    cs.LG cs.CR

    Beyond Random Split for Assessing Statistical Model Performance

    Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta

    Abstract: Even though a train/test split of the dataset randomly performed is a common practice, could not always be the best approach for estimating performance generalization under some scenarios. The fact is that the usual machine learning methodology can sometimes overestimate the generalization error when a dataset is not representative or when rare and elusive examples are a fundamental aspect of the… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

  8. arXiv:2110.05977  [pdf, other

    cs.CR

    Datasets are not Enough: Challenges in Labeling Network Traffic

    Authors: Jorge Guerra, Carlos Catania, Eduardo Veas

    Abstract: In contrast to previous surveys, the present work is not focused on reviewing the datasets used in the network security field. The fact is that many of the available public labeled datasets represent the network behavior just for a particular time period. Given the rate of change in malicious behavior and the serious challenge to label, and maintain these datasets, they become quickly obsolete. Th… ▽ More

    Submitted 30 December, 2021; v1 submitted 12 October, 2021; originally announced October 2021.

  9. arXiv:2006.06122  [pdf, other

    cs.CR cs.LG

    DNS Tunneling: A Deep Learning based Lexicographical Detection Approach

    Authors: Franco Palau, Carlos Catania, Jorge Guerra, Sebastian Garcia, Maria Rigaki

    Abstract: Domain Name Service is a trusted protocol made for name resolution, but during past years some approaches have been developed to use it for data transfer. DNS Tunneling is a method where data is encoded inside DNS queries, allowing information exchange through the DNS. This characteristic is attractive to hackers who exploit DNS Tunneling method to establish bidirectional communication with machin… ▽ More

    Submitted 14 June, 2020; v1 submitted 10 June, 2020; originally announced June 2020.