Skip to main content

Showing 1–8 of 8 results for author: Jalili, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.12473  [pdf, other

    cs.CR cs.LG

    Mal2GCN: A Robust Malware Detection Approach Using Deep Graph Convolutional Networks With Non-Negative Weights

    Authors: Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili

    Abstract: With the growing pace of using Deep Learning (DL) to solve various problems, securing these models against adversaries has become one of the main concerns of researchers. Recent studies have shown that DL-based malware detectors are vulnerable to adversarial examples. An adversary can create carefully crafted adversarial examples to evade DL-based malware detectors. In this paper, we propose Mal2G… ▽ More

    Submitted 12 March, 2022; v1 submitted 27 August, 2021; originally announced August 2021.

    Comments: 13 pages, 12 figures, 5 tables

  2. arXiv:2106.11424  [pdf, other

    cs.LG cs.CR

    HODA: Hardness-Oriented Detection of Model Extraction Attacks

    Authors: Amir Mahdi Sadeghzadeh, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili

    Abstract: Model Extraction attacks exploit the target model's prediction API to create a surrogate model in order to steal or reconnoiter the functionality of the target model in the black-box setting. Several recent studies have shown that a data-limited adversary who has no or limited access to the samples from the target model's training data distribution can use synthesis or semantically similar samples… ▽ More

    Submitted 24 February, 2022; v1 submitted 21 June, 2021; originally announced June 2021.

    Comments: 15 pages, 12 figures, 7 tables, 2 Alg

  3. arXiv:2012.10832  [pdf, other

    cs.CR cs.LG

    AWA: Adversarial Website Adaptation

    Authors: Amir Mahdi Sadeghzadeh, Behrad Tajali, Rasool Jalili

    Abstract: One of the most important obligations of privacy-enhancing technologies is to bring confidentiality and privacy to users' browsing activities on the Internet. The website fingerprinting attack enables a local passive eavesdropper to predict the target user's browsing activities even she uses anonymous technologies, such as VPNs, IPsec, and Tor. Recently, the growth of deep learning empowers advers… ▽ More

    Submitted 13 April, 2021; v1 submitted 19 December, 2020; originally announced December 2020.

    Comments: 15 pages, 7 figures, and 2 tables. Accepted in IEEE Transactions on Information Forensics and Security (TIFS)

  4. arXiv:2003.01261  [pdf, other

    cs.CR

    Adversarial Network Traffic: Towards Evaluating the Robustness of Deep Learning-Based Network Traffic Classification

    Authors: Amir Mahdi Sadeghzadeh, Saeed Shiravi, Rasool Jalili

    Abstract: Network traffic classification is used in various applications such as network traffic management, policy enforcement, and intrusion detection systems. Although most applications encrypt their network traffic and some of them dynamically change their port numbers, Machine Learning (ML) and especially Deep Learning (DL)-based classifiers have shown impressive performance in network traffic classifi… ▽ More

    Submitted 20 January, 2021; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: 14 pages, 3 figures, and 7 tables. Accepted in IEEE Transactions on Network and Service Management (TNSM). Supplementary Material: https://github.com/amsadeghzadeh/AdversarialNetworkTraffic

  5. arXiv:1811.00923  [pdf

    cs.CR

    Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili

    Abstract: Shared Web Hosting service enables hosting multitude of websites on a single powerful server. It is a well-known solution as many people share the overall cost of server maintenance and also, website owners do not need to deal with administration issues is not necessary for website owners. In this paper, we illustrate how shared web hosting service works and demonstrate the security weaknesses ris… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference for Internet Technology and Secured Transactions (ICITST), London, UK, December 2012

  6. A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili

    Abstract: With the growing of network technology along with the need of human for social interaction, using websites nowadays becomes critically important which leads in the increasing number of websites and servers. One popular solution for managing these large numbers of websites is using shared web hosting servers in order to decrease the overall cost of server maintenance. Despite affordability, this so… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, July 2013

  7. Alert Correlation Algorithms: A Survey and Taxonomy

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili

    Abstract: Alert correlation is a system which receives alerts from heterogeneous Intrusion Detection Systems and reduces false alerts, detects high level patterns of attacks, increases the meaning of occurred incidents, predicts the future states of attacks, and detects root cause of attacks. To reach these goals, many algorithms have been introduced in the world with many advantages and disadvantages. In t… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: Symposium on Cyberspace Safety and Security (CSS), Lecture Notes in Computer Science, Springer International Publishing, vol 8300, pp 183-197, Zhangjiajie, China, November 2013

  8. arXiv:1710.00101  [pdf

    cs.CR

    Statistical Disclosure: Improved, Extended, and Resisted

    Authors: Navid Emamdoost, Mohammad Sadeq Dousti, Rasool Jalili

    Abstract: Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic analysis attack, called "statistical disclosure attack." Moreover, we propose a solution to defend against the improved (and, a fortiori, the original) statistical disclosure attack. Ou… ▽ More

    Submitted 29 September, 2017; originally announced October 2017.

    Comments: SECURWARE 2012 : The Sixth International Conference on Emerging Security Information, Systems and Technologies

    Journal ref: SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies. (2012), pp. 119-125