<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">AI in Cybersecurity: Activities of the CINI-AIIS Lab at University of Naples Federico II</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Antonino</forename><surname>Ferraro</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Antonio</forename><surname>Galli</surname></persName>
							<email>antonio.galli@unina.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">La</forename><surname>Valerio</surname></persName>
						</author>
						<author>
							<persName><surname>Gatta</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Department of Computer Science</orgName>
								<orgName type="department" key="dep2">McCormick School of Engineering and Applied Science</orgName>
								<orgName type="institution">Northwestern University</orgName>
								<address>
									<addrLine>2233 Tech Dr</addrLine>
									<postCode>60208</postCode>
									<settlement>Evanston</settlement>
									<region>IL</region>
									<country key="US">United States</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lidia</forename><surname>Marassi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefano</forename><surname>Marrone</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vincenzo</forename><surname>Moscato</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marco</forename><surname>Postiglione</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Department of Computer Science</orgName>
								<orgName type="department" key="dep2">McCormick School of Engineering and Applied Science</orgName>
								<orgName type="institution">Northwestern University</orgName>
								<address>
									<addrLine>2233 Tech Dr</addrLine>
									<postCode>60208</postCode>
									<settlement>Evanston</settlement>
									<region>IL</region>
									<country key="US">United States</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Carlo</forename><surname>Sansone</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giancarlo</forename><surname>Sperli</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Naples Federico II</orgName>
								<address>
									<addrLine>Via Claudio 21</addrLine>
									<postCode>80125</postCode>
									<settlement>Naples</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">AI in Cybersecurity: Activities of the CINI-AIIS Lab at University of Naples Federico II</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F5717A2871E9A669E09A98F6C9C4BFD4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Artificial Intelligence</term>
					<term>Cybersecurity</term>
					<term>Deep Learning</term>
					<term>Machine Learning</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Artificial intelligence (AI) is revolutionizing various industries, including cybersecurity, by emulating human intelligence to address complex threats. In the cybersecurity domain, AI offers significant potential, bolstering defense mechanisms, optimizing threat detection, and advancing incident response capabilities. AI-powered systems can analyze vast datasets to identify anomalies, predict cyberattacks, and enhance overall security posture. Machine Learning (ML), a subset of AI, enables systems to learn from data and make informed decisions, such as predicting optimal security measures based on threat intelligence and operational context. Deep Learning (DL), another ML subset, harnesses Artificial Neural Networks (ANNs) to process intricate data patterns and provide accurate threat assessments. DL, especially through Convolutional Neural Networks (CNNs), is transforming cybersecurity by extracting meaningful features from network traffic and log data for anomaly detection and threat hunting. Moreover, DL integrated with Natural Language Processing (NLP) streamlines tasks like threat intelligence analysis and incident response coordination. The versatility of AI underscores its pivotal role in cybersecurity, driving resilience enhancements and fostering proactive defense strategies. In this paper, we highlight AI projects in the cybersecurity sector from the University of Naples Federico II node of the CINI-AIIS Lab, showcasing their innovative contributions to cyber defense.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Artificial intelligence (AI) is a transformative force across various industries, providing a paradigm shift in cybersecurity practices. Within the cybersecurity domain, AI is heralding significant advancements, redefining defensive strategies, amplifying threat detection capabilities, and refining incident response mechanisms. By harnessing AI technologies, organizations can fortify their defensive postures, anticipate and mitigate cyber threats proactively, and elevate overall security resilience.</p><p>At the core of AI's impact on cybersecurity lies its capacity to analyze vast and diverse datasets, enabling the identification of anomalies, prediction of emerging threats, and optimization of security measures. Machine Learning (ML), a pivotal subset of AI, equips systems with the ability to learn from data, thereby enhancing decisionmaking processes based on evolving threat landscapes and operational contexts. Deep Learning (DL), another cornerstone of AI, leverages sophisticated Artificial Neural Networks (ANNs) to discern intricate patterns within data, furnishing precise threat assessments and actionable insights. Particularly through Convolutional Neural Networks (CNNs), DL revolutionizes cybersecurity by extracting salient features from network traffic and log data, facilitating anomaly detection, threat prediction, and forensic analysis.</p><p>Moreover, the fusion of DL with Natural Language Processing (NLP) streamlines critical cybersecurity tasks, such as threat intelligence analysis, malware detection, and incident response coordination. By comprehensively analyzing textual data, NLP-powered systems augment analysts' capabilities, enabling rapid threat identification and proactive response measures.</p><p>The adaptable and multifaceted nature of AI positions it as a cornerstone of cybersecurity, driving innovation, resilience, and agility in the face of evolving threats. In this paper, we present a comprehensive overview of AI initiatives in cybersecurity, drawing from projects conducted at the University of Naples Federico II node of the CINI-AIIS Lab. Through these endeavors, we showcase the transformative potential of AI in bolstering cyber defense strategies and safeguarding digital ecosystems against emerging threats. formation, driven largely by the widespread adoption of Internet of Things (IoT) devices and Cloud Computing technologies. This proliferation has provided cybercriminals with a fertile ground for launching a multitude of attacks, ranging from the insertion of unwanted advertisements into websites to the clandestine exfiltration of sensitive data for illicit financial gains. At the forefront of these attacks are various forms of malicious software, collectively referred to as malware, which pose significant challenges to the security and integrity of digital systems. Examples of such malware include trojans, backdoors, spyware, and worms, each designed with the explicit purpose of exploiting vulnerabilities in target systems ( <ref type="bibr" target="#b0">[1]</ref>).</p><p>The detection of malware represents a formidable research endeavor, compounded by the ever-evolving sophistication of cyber threats. As Cyber Security (CS) researchers develop new detection techniques, malware authors respond in kind, continually refining their strategies to evade detection ( <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>). In this perpetual arms race, traditional antivirus software programs, reliant on signature-based detection mechanisms, have struggled to keep pace with the rapidly evolving threat landscape. Signature-based detection relies on identifying known patterns or signatures of malicious code within a database, often leading to a cat-and-mouse game where malware authors employ advanced evasion techniques such as code obfuscation to circumvent detection ( <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>).</p><p>To address the shortcomings of signature-based detection, researchers have explored alternative approaches that focus on analyzing malware behavior, rather than static code signatures. These approaches can be broadly categorized into Static Malware Detection (SMD) and Behavioral Malware Detection (BMD). SMD techniques analyze the static characteristics of malware, such as its byte-code structure, while BMD approaches monitor the dynamic behavior of malware at runtime, particularly the sequence of Application Programming Interface (API) calls made by the software to the underlying operating system ( <ref type="bibr" target="#b5">[6]</ref>). This behavioral analysis provides valuable insights into the actions performed by malware, offering a more comprehensive understanding of its capabilities and intentions.</p><p>However, the complexity and variability of modern malware present significant challenges to both SMD and BMD approaches. Static analysis techniques are vulnerable to evasion tactics such as dynamic code linking and encryption, while behavioral analysis can be computationally intensive and time-consuming ( <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>). In response to these challenges, researchers have turned to advanced Machine Learning (ML) and Deep Learning (DL) techniques to enhance the effectiveness of malware detection systems <ref type="bibr">([9, 10, 7]</ref>). These approaches leverage the power of neural networks to automatically learn complex patterns and features from raw data, offering promising avenues for improving detection accuracy and efficiency.</p><p>Despite their impressive performance, ML and DLbased detection systems often lack transparency and interpretability, raising concerns about their trustworthiness and reliability in real-world applications. To address these concerns, researchers have begun exploring the field of eXplainable Artificial Intelligence (XAI), which focuses on developing models and techniques that can provide human-understandable explanations for AI-driven decisions ( <ref type="bibr" target="#b10">[11]</ref>). In the context of malware detection, XAI methodologies aim to elucidate the underlying reasoning behind classification decisions, offering valuable insights into the features and patterns driving the detection process.</p><p>While XAI approaches have shown promise in enhancing the explainability of malware detection systems, their application to Behavioral Malware Detection (BMD) remains relatively unexplored, particularly in the context of deep sequential neural networks. This gap in research underscores the need for comprehensive investigations into the explainability of BMD systems, especially as they become increasingly reliant on advanced DL techniques. In our research, we present a novel XAI framework for BMD, leveraging a range of state-of-the-art techniques to provide transparent and interpretable explanations for classification decisions. Through extensive experimentation on publicly available datasets, we evaluate the effectiveness and robustness of our framework, shedding light on its utility and potential limitations in real-world cybersecurity applications.</p><p>More in details, our methodology builds upon a pipeline composed by three steps: the sequence preprocessing module aims to standardize the data format, the model is a classification learner that exploits the sequence structure of input data to perform the classification and the explainer generates the explanation supporting the model's prediction. Our methodological workflow is summarized in Fig. <ref type="figure" target="#fig_0">1</ref>.</p><p>To sum up, we introduced an Explainable Artificial Intelligence (XAI) framework for behavioral malware detection. We aimed to assess the effectiveness of four XAI methods within a sequence-based deep learning model and their relevance in contemporary cybersecurity applications.</p><p>Our experiments demonstrated the feasibility of various XAI techniques in explaining the decisions of LSTMbased classifiers, considering both explanation quality and computational efficiency. While our focus was on local explanations for individual samples, global explanations were not addressed.</p><p>However, limitations exist, particularly regarding the lack of qualitative metrics to directly evaluate XAI effectiveness and the potential influence of domain-specific factors on our findings. Future research will explore additional XAI methods and assess the robustness of our framework against adversarial attacks. We also plan to investigate whether explanations can enhance classification performance and assist in identifying systematic errors in predictive models. Real-world scenarios will be considered to evaluate the practical utility of explanations in aiding expert analysts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>API call sequence</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Input</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Autoencoder-Based Deep Learning Pipeline for Network Anomaly Detection</head><p>In recent years, the rapid expansion of interconnected devices, like those found in IoT and Cloud networks, has highlighted the urgent need for strong network security assessments. One crucial aspect of addressing this challenge is detecting network anomalies, which serve as important indicators of network intrusions, privacy breaches, system damage, and fraudulent activities. Deep neural networks, known for their ability to learn intricate anomaly patterns from data, have become increasingly popular in this field. However, their effectiveness can be hampered by the unique characteristics of network traffic data, which is sparse, noisy, and often imbalanced due to the multitude of devices and internet applications generating it. Anomalies typically occur in only a small fraction of instances, ranging from 0.001% to 1%. In our research, we tackle these challenges with a focused approach. Initially, we use an autoencoder (AE) to identify instances of anomalous behavior. Then, these anomalies are classified by an attack classifier based on their specific type. We have tested our framework on a largescale dataset consisting of real-world network traffic data, yielding promising results. Our proposed framework, as depicted in Figure <ref type="figure" target="#fig_1">2</ref>, operates at a high level by processing session description attributes 𝑠𝑖 (such as port number and bytes transferred) and determining whether the input is benign or represents an attack. In cases of an attack, the output 𝑦𝑖 identifies the specific type of attack (e.g., DDoS, sweep).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Denoising Autoencoder (DAE):</head><p>The DAE module processes the 𝑖-th session 𝑠𝑖 ∈ R 𝑛 and outputs its latent representation 𝑥 ˜𝑖 ∈ R 𝑘 and the reconstructed instance 𝑠 ˜𝑖 ∈ R 𝑛 . The latent representation can be considered as the DAE features, while the reconstructed instance represents how the input session might be generated from the latent space.</p><p>Reconstruction Error (RE) Module: The RE module utilizes the output of the DAE, 𝑠 ˜𝑖, to calculate the reconstruction error 𝑒𝑖 ∈ R. This error is indicative of the autoencoder's proficiency in interpreting the input session -a higher error suggests a poorer representation. The RE module assesses the similarity between 𝑠𝑖 and 𝑠 ˜𝑖 using various metrics 𝑚(), such as cosine similarity or dot product, with empirical evidence favoring the former for enhanced results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Threshold Module (TRH):</head><p>The TRH module concatenates the reconstruction error 𝑒𝑖 with the latent representation 𝑥 ˜𝑖, forming a comprehensive feature vector for the input instance. It functions as a binary classifier within a multilayer perceptron architecture, discerning if the DAE has recognized 𝑠𝑖 as akin to the benign instances it was trained on:</p><formula xml:id="formula_0">𝑓 : 𝑥 ˜𝑖 ∈ R 𝑘 → {0, 1}<label>(1)</label></formula><p>Here, a positive class indicates a benign session, while a negative class signals an attack, the specifics of which are determined by the AC module.</p><p>Attack Classifier (AC): In tandem with the TRH computation, the AC module also receives the concatenated vector of 𝑒𝑖 and 𝑥 ˜𝑖. The AC module employs a multiclass tabular classifier (such as a random forest or support vector machine) that can be trained using standard  supervised machine learning methods. It assigns the attack typology to the input instance, with the choice of classification algorithm impacting overall performance, as detailed in the experimental section. The final decision of the framework is derived by considering the outputs of both the TRH and AC modules. If the TRH output is zero, indicating successful reconstruction by the DAE, the input instance is classified as benign. If not, the input instance is classified according to the attack type predicted by the AC module. This approach leverages the DAE's ability to recognize benign sessions, a capability honed through extensive training on numerous instances, while the AC module provides the specificity in attack typology classification when an attack is presumed.</p><p>Our dataset has been provided with the NAD2021 challenge <ref type="bibr" target="#b11">[12]</ref>, where participants are provided with traffic records from three specific dates, classified as either normal traffic or a specific type of network attack. The challenge focuses on two primary types of attacks: (1) probing attacks, that involve attempts to extract data from a targeted network, and (2) DDOS-Smurf attacks, which are characterized by the use of numerous ICMP flows, aimed at overwhelming and halting traffic to a specific destination IP address.</p><p>The DAE module was trained using an early stopping mechanism, halting after three epochs without MSE improvement on the validation set. Figure <ref type="figure" target="#fig_2">3</ref> show that training stops at 69 epochs and the model easily learns  The TRH model, integrating latent features from the DAE and its reconstruction error, was trained to classify samples as Normal (0) or Anomalous (1), using a similar early stopping strategy set at 10 epochs. Figure <ref type="figure" target="#fig_3">4</ref> show that training stops at epoch 202 with a training accuracy 𝐴𝑐𝑐𝑡𝑟𝑎𝑖𝑛 = 0.9697 and validation accuracy 𝐴𝑐𝑐 𝑣𝑎𝑙 = 0.9698. These results indicate the model's proficiency in differentiating between anomalous and normal samples.</p><p>The AC module, tasked with classifying attack samples identified by the TRH, was trained using a RandomForest classifier. Performance metrics, including Precision, Recall, and F1 scores, are detailed in the classification report. The confusion matrix provides further insights into the classifier's performance across different attack types. We report results in Table <ref type="table" target="#tab_0">1</ref> (Precision, Recall and The final test assessed the combined performance of the DAE, TRH, and AC modules on the test set. Given the unbalanced nature of the data, Precision and Recall were key metrics for evaluating the DAE+TRH's ability to distinguish between normal and anomalous samples. While these modules demonstrated high quality in differentiating negatives from positives, there were limitations in identifying all anomalies. The cumulative errors from the DAE+TRH and AC modules are reflected in the overall system performance. The aggregated 𝐹 𝛼𝛽 score, evaluating the system across all classes, was recorded as 0.577, indicating areas for improvement in the pipeline's ability to accurately classify various types of network activities.</p><p>In conclusion, we introduced a streamlined and effective framework for Network Anomaly Detection (NAD). Our approach involves two main phases: (1) identifying anomalies using latent features generated by a Deep Denoising Autoencoder, and (2) classifying these anomalies with a multi-label classifier. Despite potential error propagation within the pipeline, our approach has shown promising results. However, we observed a limitation in the performance of the Threshold module (TRH), particularly in detecting attack samples, due to dataset imbalance. Future research will focus on implementing classbalancing techniques to improve the TRH module's effectiveness and enhance the overall system performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">AI Act and Biometrics</head><p>As AI becomes more integrated into daily life, cybersecurity emerges as a critical concern. The AI Act, the first global law on AI usage, serves as a key regulatory framework within the European Union, emphasizing ethical considerations in cybersecurity. This law seeks a balance between technological innovation and the protection of core ethical values, ensuring AI is used responsibly. Particularly important within the AI Act is the role of cybersecurity for high-risk AI systems, which requires a comprehensive security approach. One significant challenge addressed by the AI Act is the management of biometrics, acknowledging their sensitive nature and the privacy and security implications for individuals. The act is particularly concerned with the ethical use of biometric data, such as fingerprints, and facial and vocal recognition, due to the personal data protection it necessitates. To regulate the deployment of facial and biometric recognition technologies in public spaces, the AI Act sets strict rules, allowing exceptions only in well-defined scenarios like locating missing persons or preventing serious crimes <ref type="bibr" target="#b12">[13]</ref>.</p><p>While the AI Act represents a significant step forward in balancing the benefits of artificial intelligence with the protection of fundamental rights, it also makes even more complex the landscape of challenges that remain. Indeed, on one hand, stringent regulations are essential for managing the risks associated with AI technologies and ensuring they adhere to ethical standards. On the other hand, continuous research in the field of AI and biometrics is critical. The need for advancing research in biometrics is recognized globally, to the extent that numerous international competitions have been established to challenge researchers in identifying fake biometrics. Over the years, the Naples' CINI AI-IS node has made significant contributions to the field of fake fingerprint detection. It has actively participated in several editions of LIVDET<ref type="foot" target="#foot_0">1</ref> , an international competition that challenges researchers with the task of distinguishing between live and fake fingerprints created through diverse techniques and spoofing materials. Our team has achieved notable success in the last two editions, securing first place in one and second place in another. These accomplishments were made possible through our innovative use of adversarial learning techniques, which allowed us to perform a synthetic data augmentation able to improve the overall performance of a liveness detector <ref type="bibr" target="#b13">[14]</ref> achieving an accuracy over 90% on two dataset. More recently, exploiting the experience matured over the years, we also developed a new fake fingerprint crafting strategy that can be used to physically cast a fake fingerprint able to bypass AI-based liveness detectors <ref type="bibr" target="#b14">[15]</ref>.</p><p>These results not only anticipate future cybersecurity threats but also aid in formulating effective defence mechanisms. To address this need while also protecting people from unwanted misuses, we advocate that one of the major challenges in the field of AI is education, to promote a deeper understanding of the risks and ethical implications of AI and enable people to participate in an informed and conscious manner in public debate and decision-making regarding the use and regulation of these technologies. In pursuing a balance between technological innovation and the protection of fundamental rights, it seems necessary to promote an open and inclusive dialogue involving both developers and civil society stakeholders <ref type="bibr" target="#b15">[16]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Methodological workflow. The pre-processing step aims to standardize the data format. The model classifies the input sequence as malware/goodware, and the explainer generates the explanation. The models are then evaluated in terms of classification performance, efficiency and explanations quality.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Overview of proposed NAD pipeline.</figDesc><graphic coords="4,151.80,84.19,291.67,69.82" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: DAE reconstruction error on training and validation splits. On the x axis we report the increasing number of epochs, while MSE values are reported on the y axis.</figDesc><graphic coords="4,97.22,196.27,187.51,117.73" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: TRH accuracy on training and validation splits. On the x axis we report the increasing number of epochs, while accuracy values are reported on the y axis.</figDesc><graphic coords="4,320.96,196.27,166.68,109.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Attacks Classifier, validation performance</figDesc><table><row><cell>Anomaly</cell><cell>Precision</cell><cell>Recall</cell><cell>F1</cell></row><row><cell>DDoS</cell><cell>0.99</cell><cell>1.00</cell><cell>0.99</cell></row><row><cell>IP sweep</cell><cell>1.00</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>Nmap sweep</cell><cell>0.98</cell><cell>0.87</cell><cell>0.92</cell></row><row><cell>Port sweep</cell><cell>0.99</cell><cell>0.99</cell><cell>0.99</cell></row><row><cell cols="4">to reconstruct input samples. The final MSE scores were</cell></row><row><cell cols="4">1.2944e-5 for training and 1.2402e-5 for validation. Ad-</cell></row><row><cell cols="4">ditionally, further training for five epochs using both</cell></row><row><cell cols="4">training and validation data reduced the training MSE to</cell></row><row><cell>1.1759e-5.</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Attacks classifier, validation confusion matrix</figDesc><table><row><cell></cell><cell>DDoS</cell><cell>IP sweep</cell><cell cols="2">Nmap sweep</cell><cell>Port sweep</cell></row><row><cell>DDoS</cell><cell>374</cell><cell>1</cell><cell>0</cell><cell></cell><cell>0</cell></row><row><cell>IP sweep</cell><cell>2</cell><cell>38310</cell><cell>0</cell><cell></cell><cell>172</cell></row><row><cell>Nmap sweep</cell><cell>1</cell><cell>4</cell><cell>116</cell><cell></cell><cell>12</cell></row><row><cell>Port sweep</cell><cell>2</cell><cell>109</cell><cell>2</cell><cell></cell><cell>12253</cell></row><row><cell>Table 3</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="6">Test performance of DAE+TRH modules distinguishing anoma-</cell></row><row><cell cols="3">lous and normal samples</cell><cell></cell><cell></cell></row><row><cell cols="2">Class</cell><cell>Precision</cell><cell>Recall</cell><cell>F1</cell></row><row><cell cols="2">Normal</cell><cell>1.00</cell><cell>0.96</cell><cell>0.98</cell></row><row><cell cols="2">Anomaly</cell><cell>0.47</cell><cell>0.98</cell><cell>0.63</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 4</head><label>4</label><figDesc>Test performance of the entire DAE+TRH+AC pipeline</figDesc><table><row><cell>Class</cell><cell>Precision</cell><cell>Recall</cell><cell>F1</cell></row><row><cell>DDoS</cell><cell>0.11</cell><cell>0.52</cell><cell>0.19</cell></row><row><cell>Normal</cell><cell>1.00</cell><cell>0.96</cell><cell>0.98</cell></row><row><cell>IP sweep</cell><cell>0.53</cell><cell>0.99</cell><cell>0.69</cell></row><row><cell>Nmap sweep</cell><cell>0.96</cell><cell>0.83</cell><cell>0.89</cell></row><row><cell>Port sweep</cell><cell>0.34</cell><cell>0.95</cell><cell>0.50</cell></row><row><cell cols="3">F1 scores) and Table 2 (confusion matrix).</cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://sites.unica.it/livdet/</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported in part by the Piano Nazionale Ripresa Resilienza (PNRR) Ministero dell'Università e della Ricerca (MUR) Project under Grant PE0000013-FAIR</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A survey of adversarial attack and defense methods for malware classification in cyber security</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Yu</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMST.2022.3225137</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="467" to="496" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Systematical and longitudinal study of evasive behaviors in windows malware</title>
		<author>
			<persName><forename type="first">N</forename><surname>Galloro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Polino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Carminati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Continella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zanero</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2021.102550</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.cose.2021.102550" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">113</biblScope>
			<biblScope unit="page">102550</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors</title>
		<author>
			<persName><forename type="first">F</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yu</surname></persName>
		</author>
		<idno type="DOI">10.1109/TC.2023.3236901</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computers</title>
		<imprint>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A survey on heuristic malware detection techniques</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Bazrafshan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hashemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M H</forename><surname>Fard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hamzeh</surname></persName>
		</author>
		<idno type="DOI">10.1109/IKT.2013.6620049</idno>
	</analytic>
	<monogr>
		<title level="m">The 5th Conference on Information and Knowledge Technology</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="113" to="120" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">{Obfuscation-Resilient} executable payload extraction from packed malware</title>
		<author>
			<persName><forename type="first">B</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Leal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-Y</forename><surname>Marion</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">30th USENIX Security Symposium (USENIX Security 21)</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="3451" to="3468" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Malware detection based on structural and behavioural features of api calls</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alazab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Layton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Venkatraman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Watters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International cyber resilience conference (1st: 2010</title>
				<imprint>
			<publisher>Edith Cowan University</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Malware detection with artificial intelligence: A systematic literature review</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Gaber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Janicke</surname></persName>
		</author>
		<idno type="DOI">10.1145/3638552</idno>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A comparison of static, dynamic, and hybrid analysis for malware detection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Damodaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Di Troia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Visaggio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Austin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stamp</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11416-015-0261-z</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1007/s11416-015-0261-z" />
	</analytic>
	<monogr>
		<title level="j">Journal of Computer Virology and Hacking Techniques</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Deep learning based sequential model for malware analysis using windows exe api calls</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">O</forename><surname>Catak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Yazı</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Elezaj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ahmed</surname></persName>
		</author>
		<idno type="DOI">10.7717/peerj-cs.285</idno>
		<ptr target="https://doi.org/10.7717/peerj-cs.285.doi:10.7717/peerj-cs.285" />
	</analytic>
	<monogr>
		<title level="j">PeerJ Computer Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page">e285</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A comprehensive survey on deep learning based malware detection techniques</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Sethuraman</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cosrev.2022.100529</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.cosrev.2022.100529" />
	</analytic>
	<monogr>
		<title level="j">Computer Science Review</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page">100529</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Explainable Artificial Intelligence (XAI): What we know and what is left to attain Trustworthy Artificial Intelligence</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Abuhmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>El-Sappagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Muhammad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Alonso-Moral</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Confalonieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Guidotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Del</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Díaz-Rodríguez</surname></persName>
		</author>
		<author>
			<persName><surname>Herrera</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.inffus.2023.101805</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1016/j.inffus.2023.101805" />
	</analytic>
	<monogr>
		<title level="j">Information Fusion</title>
		<imprint>
			<biblScope unit="volume">99</biblScope>
			<biblScope unit="page">101805</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">.0: A large-scale dataset for real-world network anomaly detection</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-E</forename><surname>Weng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-J</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-H</forename><surname>Shuai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-H</forename><surname>Cheng</surname></persName>
		</author>
		<idno type="DOI">10.48550/ARXIV.2103.05767</idno>
		<ptr target="https://arxiv.org/abs/2103.05767.doi:10.48550/ARXIV.2103.05767" />
	</analytic>
	<monogr>
		<title level="m">Zyell-nctu nettraffic-1</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Madiega</surname></persName>
		</author>
		<title level="m">Artificial intelligence act, European Parliament</title>
				<imprint>
			<publisher>European Parliamentary Research Service</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Adversarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection</title>
		<author>
			<persName><forename type="first">A</forename><surname>Galli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gravina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Marrone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mattiello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sansone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET Biometrics</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="102" to="111" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Realistic fingerprint presentation attacks based on an adversarial approach</title>
		<author>
			<persName><forename type="first">R</forename><surname>Casula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Orrù</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Marrone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Gagliardini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Marcialis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sansone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics and Security</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Emerging challenges in ai and the need for ai ethics education</title>
		<author>
			<persName><forename type="first">J</forename><surname>Borenstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Howard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI and Ethics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="61" to="65" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
