Proceedings of the 31st ACM International Conference on Information &Amp; Knowledge Management 2022
DOI: 10.1145/3511808.3557121
|View full text |Cite
|
Sign up to set email alerts
|

RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…By training AI models on large datasets of malware samples, adversaries can develop sophisticated malware strains that are highly polymorphic and capable of adapting their behavior to evade detection. Furthermore, AI-powered malware can autonomously spread across networks, infecting vulnerable systems and compromising sensitive data (Schram, 2021;Karapoola, et al, 2022). Moreover, AI-powered attacks can exploit vulnerabilities in AI-enabled systems themselves.…”
Section: Emerging Threat Landscape: Risks and Vulnerabilitiesmentioning
confidence: 99%
“…By training AI models on large datasets of malware samples, adversaries can develop sophisticated malware strains that are highly polymorphic and capable of adapting their behavior to evade detection. Furthermore, AI-powered malware can autonomously spread across networks, infecting vulnerable systems and compromising sensitive data (Schram, 2021;Karapoola, et al, 2022). Moreover, AI-powered attacks can exploit vulnerabilities in AI-enabled systems themselves.…”
Section: Emerging Threat Landscape: Risks and Vulnerabilitiesmentioning
confidence: 99%
“…As ransomware techniques become more sophisticated, the potential damage they can inflict grows exponentially, not only in terms of financial loss but also in their capacity to undermine the very foundations of trust upon which digital interactions are based [18], [42]. This evolving scenario necessitates a proactive stance in cybersecurity measures, where continuous learning, adaptation, and the cultivation of a cybersecurity-conscious culture become indispensable in the fight against ransomware [9], [10].…”
Section: B Impact Of Ransomware Attacksmentioning
confidence: 99%
“…The most alarming, perhaps, is data theft ransomware, which not only encrypts data but also threatens to release sensitive information publicly unless a ransom is paid, adding an additional layer of complexity and danger [8]. The proliferation of these ransomware types has been noted in various sectors, signifying a shift in the landscape of digital security threats [9], [10]. For instance, cryptoransomware attacks have been observed to increase by approximately 47.5% over the past few years, indicating a trend that necessitates immediate attention [11], [12].…”
Section: Introductionmentioning
confidence: 99%