Questions tagged [machine-learning]

How to use machine learning for security (e.g. for filtering or analytics) as well as security of machine learning systems (e.g. attempts to "fool" them).

22 questions
31
votes
6 answers

Can a neural network crack hashing algorithms?

I've been reading a bit about neural networks, and their ability to approximate many complex functions. Wouldn't a neural network be capable of cracking a hashing algorithm like SHA256? For example, say we want to train our network to crack strings…
Saturn
  • 563
  • 1
  • 5
  • 10
10
votes
1 answer

Can CAPTCHA-solving patterns be used to track/identify a person?

Captchas are everywhere. Suppose you're a big company offering Captchas on many sites and you can easily track a user across the web simply by setting a cookie everytime some site loads your captcha engine. But apart from that, I am wondering if it…
dervonnebenaan
  • 365
  • 2
  • 7
3
votes
3 answers

Extracting features from PE files. Machine learning and malware

Are the features which can be extracted from a PE file (some information from headers, section names, strings, import, export sections etc) enough to use them to train particular machine learning algorithms to detect whether the suspicious file is…
bielu000
  • 131
  • 1
2
votes
1 answer

What features would you use to detect a backdoor or a bot installation?

I was reading a document about logging and analysis. The document talks about statistical analysis and machine learning techniques to detect some attack scenarios. For instance, If you want to detect a Possible Brute Force Log-in, you might want to…
U. User
  • 180
  • 8
2
votes
1 answer

Can IP address considered as a useful feature for intrusion detection?

I am trying to build a machine learning model which classifies attacks. My data has a bunch of IP addresses, and I don't know if I should use the IP address as a feature to detect attacks. I found this interesting argument: "IP can be spoofed by the…
U. User
  • 180
  • 8
2
votes
4 answers

Web Application Firewall with based on an external decision to detect anomaly

I have a theoretical knowledge about WAF but I do not have knowledge of the tools in the market. I wonder if there are any WAFs that base their decision making through a response from an external resource (true or false) when sorting an anomalous…
1
vote
2 answers

How to source training data in ML for information security?

A company entrusts a Data Scientist with the mission of processing and valuing data for the research or treatment of events related to traces of computer attacks. I was wondering how would he get the train data. I guess he would need to exploit the…
1
vote
0 answers

Publicly Available PCAP dumps that associate IP addresses with Operating System?

I am currently working on a machine learning module to detect Operating Systems based on existing packet traffic in pcap file format. So far, I have generated some traffic of popular Operating Systems available. However, this process is very…
Alan
  • 11
  • 2
1
vote
0 answers

Anonymous (privacy-preserving) random walk

Quoting this paper - SmartWalk (https://dl.acm.org/doi/pdf/10.1145/2976749.2978319): For graph privacy, strong link privacy relies on deep perturbation to the original graph, indicating a large random walk length. However, as the fixed random…
rshah
  • 153
  • 6
1
vote
2 answers

What is the term for adding benign code/behavior to malware to evade antiviruses?

Some malware authors add benign code/behavior to their malware just to throw off antiviruses and IDSs which employ machine learning to detect malware. There is a name for this technique (and even a Wikipedia page somewhere) but I can't seem to…
1
vote
0 answers

FYP ideas in Applications of Machine Learning in Cyber Security domain

I am a Computer Science Engineering undergraduate aspiring to pursue a career in the field of cyber security. I have some experience in web application security, memory and network forensics fields. I would like to have some suggestions for my FYP…
Picanto
  • 11
  • 1
1
vote
1 answer

Is it possible to exploit computer vision to achieve remote code execution?

What kind of vulnerability in the implementation of a vision-based machine learning system (object recognition, for example) would enable an attacker to achieve remote code execution? The only instance I can think of is a vulnerability (e.g., buffer…
1
vote
1 answer

How we can PoC our product that needs training data for our machine learning algorithm of the the bank clients?

Recently, we have had a challenge with potential future clients which are the bank. Our product requires to gather static data (e.g. address, loans, last 50 transactions, etc) of banks clients. These banks do their PoC in the public cloud, the banks…
Filipon
  • 1,204
  • 10
  • 22
1
vote
1 answer

The role of Machine Learning In Cybersecurity Defense

Hackers and malware are one step ahead of cybersecurity experts, and every time technology is released to the market, vulnerabilities will be quickly discovered and exploited. How effective can machine learning technology be particularly in the…
R1W
  • 1,617
  • 3
  • 15
  • 30
0
votes
2 answers

Can Machine Learning be utilized to identify and track IP Spoofing?

"IP Spoofing" refers to changing source IP addresses so that the attack appears to be coming from someone else. When the victim replies to the address, it goes back to the spoofed address and not to the attacker’s real address.
Jakob
  • 1
1
2