Skip to main content

Showing 1–5 of 5 results for author: Iacovazzi, A

Searching in archive cs. Search in all archives.
.
  1. Towards Cyber Threat Intelligence for the IoT

    Authors: Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza

    Abstract: With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization's threat mitigation strategy. This Cyber Threat Intelligence (CTI) is becoming increasingly important, or rather necessary, for critical national and industrial infrastructures. Current CTI solutions are rather fede… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Journal ref: 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023

  2. On the Resilience of Machine Learning-Based IDS for Automotive Networks

    Authors: Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza

    Abstract: Modern automotive functions are controlled by a large number of small computers called electronic control units (ECUs). These functions span from safety-critical autonomous driving to comfort and infotainment. ECUs communicate with one another over multiple internal networks using different technologies. Some, such as Controller Area Network (CAN), are very simple and provide minimal or no securit… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Journal ref: 2023 IEEE Vehicular Networking Conference (VNC), Istanbul, Turkiye, 2023, pp. 239-246

  3. Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

    Authors: Alfonso Iacovazzi, Shahid Raza

    Abstract: We propose a novel solution combining supervised and unsupervised machine learning models for intrusion detection at kernel level in cloud containers. In particular, the proposed solution is built over an ensemble of random and isolation forests trained on sequences of system calls that are collected at the hosting machine's kernel level. The sequence of system calls are translated into a weighted… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Journal ref: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 2022, pp. 30-37

  4. arXiv:1905.11831  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

    Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder

    Abstract: Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for this purpose. Although prior research has demonstrated how machine learning and deep learning algorithms can be bypassed by carefully crafted adversarial samples, there has been very lit… ▽ More

    Submitted 26 November, 2019; v1 submitted 28 May, 2019; originally announced May 2019.

    Comments: Accepted in 2019 International Joint Conference on Neural Networks (IJCNN). Update of DOI

  5. DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback

    Authors: Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici

    Abstract: Watermarking techniques have been proposed during the last 10 years as an approach to trace network flows for intrusion detection purposes. These techniques aim to impress a hidden signature on a traffic flow. A central property of network flow watermarking is invisibility, i.e., the ability to go unidentified by an unauthorized third party. Although widely sought after, the development of an invi… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.