=Paper= {{Paper |id=Vol-3762/569 |storemode=property |title=AI in Cybersecurity: Activities of the CINI-AIIS Lab at University of Naples Federico II |pdfUrl=https://ceur-ws.org/Vol-3762/569.pdf |volume=Vol-3762 |authors=Antonino Ferraro,Antonio Galli,Valerio La Gatta,Lidia Marassi,Stefano Marrone,Vincenzo Moscato,Marco Postiglione,Carlo Sansone,Giancarlo Sperlì |dblpUrl=https://dblp.org/rec/conf/ital-ia/FerraroGGM0MPSS24 }} ==AI in Cybersecurity: Activities of the CINI-AIIS Lab at University of Naples Federico II== https://ceur-ws.org/Vol-3762/569.pdf
                                AI in Cybersecurity: Activities of the CINI-AIIS Lab at
                                University of Naples Federico II
                                Antonino Ferraro1 , Antonio Galli1,* , Valerio La Gatta1,2 , Lidia Marassi1 , Stefano Marrone1 ,
                                Vincenzo Moscato1 , Marco Postiglione1,2 , Carlo Sansone1 and Giancarlo Sperli1
                                1
                                 University of Naples Federico II, Via Claudio 21, Naples, 80125, Italy
                                2
                                 Northwestern University, Department of Computer Science, McCormick School of Engineering and Applied Science, 2233 Tech Dr, Evanston, IL
                                60208, United States


                                                Abstract
                                                Artificial intelligence (AI) is revolutionizing various industries, including cybersecurity, by emulating human intelligence
                                                to address complex threats. In the cybersecurity domain, AI offers significant potential, bolstering defense mechanisms,
                                                optimizing threat detection, and advancing incident response capabilities. AI-powered systems can analyze vast datasets
                                                to identify anomalies, predict cyberattacks, and enhance overall security posture. Machine Learning (ML), a subset of AI,
                                                enables systems to learn from data and make informed decisions, such as predicting optimal security measures based on
                                                threat intelligence and operational context. Deep Learning (DL), another ML subset, harnesses Artificial Neural Networks
                                                (ANNs) to process intricate data patterns and provide accurate threat assessments. DL, especially through Convolutional
                                                Neural Networks (CNNs), is transforming cybersecurity by extracting meaningful features from network traffic and log data
                                                for anomaly detection and threat hunting. Moreover, DL integrated with Natural Language Processing (NLP) streamlines
                                                tasks like threat intelligence analysis and incident response coordination. The versatility of AI underscores its pivotal role
                                                in cybersecurity, driving resilience enhancements and fostering proactive defense strategies. In this paper, we highlight AI
                                                projects in the cybersecurity sector from the University of Naples Federico II node of the CINI-AIIS Lab, showcasing their
                                                innovative contributions to cyber defense.

                                                Keywords
                                                Artificial Intelligence, Cybersecurity, Deep Learning, Machine Learning



                                1. Introduction                                                                                          Networks (CNNs), DL revolutionizes cybersecurity by
                                                                                                                                         extracting salient features from network traffic and log
                                Artificial intelligence (AI) is a transformative force across                                            data, facilitating anomaly detection, threat prediction,
                                various industries, providing a paradigm shift in cyberse-                                               and forensic analysis.
                                curity practices. Within the cybersecurity domain, AI is                                                    Moreover, the fusion of DL with Natural Language
                                heralding significant advancements, redefining defensive                                                 Processing (NLP) streamlines critical cybersecurity tasks,
                                strategies, amplifying threat detection capabilities, and                                                such as threat intelligence analysis, malware detection,
                                refining incident response mechanisms. By harnessing                                                     and incident response coordination. By comprehensively
                                AI technologies, organizations can fortify their defensive                                               analyzing textual data, NLP-powered systems augment
                                postures, anticipate and mitigate cyber threats proac-                                                   analysts’ capabilities, enabling rapid threat identification
                                tively, and elevate overall security resilience.                                                         and proactive response measures.
                                   At the core of AI’s impact on cybersecurity lies its                                                     The adaptable and multifaceted nature of AI positions
                                capacity to analyze vast and diverse datasets, enabling                                                  it as a cornerstone of cybersecurity, driving innovation,
                                the identification of anomalies, prediction of emerging                                                  resilience, and agility in the face of evolving threats. In
                                threats, and optimization of security measures. Machine                                                  this paper, we present a comprehensive overview of AI
                                Learning (ML), a pivotal subset of AI, equips systems with                                               initiatives in cybersecurity, drawing from projects con-
                                the ability to learn from data, thereby enhancing decision-                                              ducted at the University of Naples Federico II node of the
                                making processes based on evolving threat landscapes                                                     CINI-AIIS Lab. Through these endeavors, we showcase
                                and operational contexts. Deep Learning (DL), another                                                    the transformative potential of AI in bolstering cyber
                                cornerstone of AI, leverages sophisticated Artificial Neu-                                               defense strategies and safeguarding digital ecosystems
                                ral Networks (ANNs) to discern intricate patterns within                                                 against emerging threats.
                                data, furnishing precise threat assessments and action-
                                able insights. Particularly through Convolutional Neural
                                                                                                                                         2. Interpreting AI Models for
                                Ital-IA 2024: 4th National Conference on Artificial Intelligence, orga-
                                nized by CINI, May 29-30, 2024, Naples, Italy                                                               Behavioral Malware Detection
                                *
                                  Corresponding author.
                                $ antonio.galli@unina.it (A. Galli)                                                                      In the past decade, the landscape of cyber threats to In-
                                          © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
                                          Attribution 4.0 International (CC BY 4.0).                                                     formation Systems has undergone a remarkable trans-




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
formation, driven largely by the widespread adoption of           promising avenues for improving detection accuracy and
Internet of Things (IoT) devices and Cloud Computing              efficiency.
technologies. This proliferation has provided cybercrimi-            Despite their impressive performance, ML and DL-
nals with a fertile ground for launching a multitude of           based detection systems often lack transparency and in-
attacks, ranging from the insertion of unwanted adver-            terpretability, raising concerns about their trustworthi-
tisements into websites to the clandestine exfiltration of        ness and reliability in real-world applications. To address
sensitive data for illicit financial gains. At the forefront of   these concerns, researchers have begun exploring the
these attacks are various forms of malicious software, col-       field of eXplainable Artificial Intelligence (XAI), which fo-
lectively referred to as malware, which pose significant          cuses on developing models and techniques that can pro-
challenges to the security and integrity of digital systems.      vide human-understandable explanations for AI-driven
Examples of such malware include trojans, backdoors,              decisions ([11]). In the context of malware detection, XAI
spyware, and worms, each designed with the explicit               methodologies aim to elucidate the underlying reasoning
purpose of exploiting vulnerabilities in target systems           behind classification decisions, offering valuable insights
([1]).                                                            into the features and patterns driving the detection pro-
   The detection of malware represents a formidable re-           cess.
search endeavor, compounded by the ever-evolving so-                 While XAI approaches have shown promise in enhanc-
phistication of cyber threats. As Cyber Security (CS)             ing the explainability of malware detection systems, their
researchers develop new detection techniques, malware             application to Behavioral Malware Detection (BMD) re-
authors respond in kind, continually refining their strate-       mains relatively unexplored, particularly in the context
gies to evade detection ([2, 3]). In this perpetual arms          of deep sequential neural networks. This gap in research
race, traditional antivirus software programs, reliant            underscores the need for comprehensive investigations
on signature-based detection mechanisms, have strug-              into the explainability of BMD systems, especially as they
gled to keep pace with the rapidly evolving threat land-          become increasingly reliant on advanced DL techniques.
scape. Signature-based detection relies on identifying            In our research, we present a novel XAI framework for
known patterns or signatures of malicious code within a           BMD, leveraging a range of state-of-the-art techniques
database, often leading to a cat-and-mouse game where             to provide transparent and interpretable explanations
malware authors employ advanced evasion techniques                for classification decisions. Through extensive experi-
such as code obfuscation to circumvent detection ([4, 5]).        mentation on publicly available datasets, we evaluate the
   To address the shortcomings of signature-based detec-          effectiveness and robustness of our framework, shedding
tion, researchers have explored alternative approaches            light on its utility and potential limitations in real-world
that focus on analyzing malware behavior, rather than             cybersecurity applications.
static code signatures. These approaches can be broadly              More in details, our methodology builds upon a
categorized into Static Malware Detection (SMD) and               pipeline composed by three steps: the sequence pre-
Behavioral Malware Detection (BMD). SMD techniques                processing module aims to standardize the data format,
analyze the static characteristics of malware, such as its        the model is a classification learner that exploits the se-
byte-code structure, while BMD approaches monitor the             quence structure of input data to perform the classifica-
dynamic behavior of malware at runtime, particularly              tion and the explainer generates the explanation support-
the sequence of Application Programming Interface (API)           ing the model’s prediction. Our methodological workflow
calls made by the software to the underlying operating            is summarized in Fig. 1.
system ([6]). This behavioral analysis provides valuable             To sum up, we introduced an Explainable Artificial
insights into the actions performed by malware, offering          Intelligence (XAI) framework for behavioral malware de-
a more comprehensive understanding of its capabilities            tection. We aimed to assess the effectiveness of four XAI
and intentions.                                                   methods within a sequence-based deep learning model
   However, the complexity and variability of modern              and their relevance in contemporary cybersecurity appli-
malware present significant challenges to both SMD and            cations.
BMD approaches. Static analysis techniques are vulnera-              Our experiments demonstrated the feasibility of vari-
ble to evasion tactics such as dynamic code linking and           ous XAI techniques in explaining the decisions of LSTM-
encryption, while behavioral analysis can be computa-             based classifiers, considering both explanation quality
tionally intensive and time-consuming ([7, 8]). In re-            and computational efficiency. While our focus was on
sponse to these challenges, researchers have turned to            local explanations for individual samples, global expla-
advanced Machine Learning (ML) and Deep Learning                  nations were not addressed.
(DL) techniques to enhance the effectiveness of malware              However, limitations exist, particularly regarding the
detection systems ([9, 10, 7]). These approaches lever-           lack of qualitative metrics to directly evaluate XAI effec-
age the power of neural networks to automatically learn           tiveness and the potential influence of domain-specific
complex patterns and features from raw data, offering             factors on our findings.
                                                                                                       LIME       Classification performance




                                                                LSTM / GRU
                Decreasing redundancy                                                                             Efficiency




                                              Embedding




                                                                                            Softmax
                                                                                                       SHAP




                                                                                    Dense
                                                                                                                  Compatibility




                                        ...



                                                          ...



                                                                              ...
                                                                                                                  Sequence-level representations
                      Padding                                                                           LRP       Perturbation
 API call
 sequence                                                                                                         Sufficiency
                                                                                                      Attention   Stability



  Input            Pre-processing                                            Model                      XAI             Evaluation


Figure 1: Methodological workflow. The pre-processing step aims to standardize the data format. The model classifies the
input sequence as malware/goodware, and the explainer generates the explanation. The models are then evaluated in terms of
classification performance, efficiency and explanations quality.



   Future research will explore additional XAI methods        attributes 𝑠𝑖 (such as port number and bytes transferred)
and assess the robustness of our framework against ad-        and determining whether the input is benign or repre-
versarial attacks. We also plan to investigate whether        sents an attack. In cases of an attack, the output 𝑦𝑖 iden-
explanations can enhance classification performance and       tifies the specific type of attack (e.g., DDoS, sweep).
assist in identifying systematic errors in predictive mod-       Denoising Autoencoder (DAE): The DAE module
els. Real-world scenarios will be considered to evaluate      processes the 𝑖-th session 𝑠𝑖 ∈ R𝑛 and outputs its latent
the practical utility of explanations in aiding expert ana-   representation 𝑥    ˜ 𝑖 ∈ R𝑘 and the reconstructed instance
lysts.                                                       ˜𝑠𝑖 ∈ R . The latent representation can be considered
                                                                       𝑛

                                                              as the DAE features, while the reconstructed instance
                                                              represents how the input session might be generated
3. Autoencoder-Based Deep                                     from the latent space.
      Learning Pipeline for Network                              Reconstruction Error (RE) Module: The RE mod-
                                                              ule utilizes the output of the DAE, ˜𝑠𝑖 , to calculate the
     Anomaly Detection                                        reconstruction error 𝑒𝑖 ∈ R. This error is indicative of
In recent years, the rapid expansion of interconnected the autoencoder’s proficiency in interpreting the input
devices, like those found in IoT and Cloud networks, has session - a higher error suggests a poorer representation.
highlighted the urgent need for strong network secu- The RE module assesses the similarity between 𝑠𝑖 and ˜𝑠𝑖
rity assessments. One crucial aspect of addressing this using various metrics 𝑚(), such as cosine similarity or
challenge is detecting network anomalies, which serve dot product, with empirical evidence favoring the former
as important indicators of network intrusions, privacy for enhanced results.
breaches, system damage, and fraudulent activities. Deep         Threshold Module (TRH): The TRH module con-
neural networks, known for their ability to learn intricate   catenates   the reconstruction error 𝑒𝑖 with the latent rep-
anomaly patterns from data, have become increasingly resentation 𝑥          ˜ 𝑖 , forming a comprehensive feature vector
popular in this field. However, their effectiveness can       for  the input  instance. It functions as a binary classifier
be hampered by the unique characteristics of network         within    a multilayer     perceptron architecture, discerning if
traffic data, which is sparse, noisy, and often imbalanced the DAE has recognized 𝑠𝑖 as akin to the benign instances
due to the multitude of devices and internet applications it was trained on:
generating it. Anomalies typically occur in only a small
fraction of instances, ranging from 0.001% to 1%. In our                            𝑓 :𝑥  ˜ 𝑖 ∈ R𝑘 → {0, 1}                (1)
research, we tackle these challenges with a focused ap-          Here, a positive class indicates a benign session, while
proach. Initially, we use an autoencoder (AE) to identify a negative class signals an attack, the specifics of which
instances of anomalous behavior. Then, these anoma- are determined by the AC module.
lies are classified by an attack classifier based on their       Attack Classifier (AC): In tandem with the TRH com-
specific type. We have tested our framework on a large- putation, the AC module also receives the concatenated
scale dataset consisting of real-world network traffic data, vector of 𝑒𝑖 and 𝑥      ˜ 𝑖 . The AC module employs a multi-
yielding promising results.                                   class tabular classifier (such as a random forest or sup-
   Our proposed framework, as depicted in Figure 2, op- port vector machine) that can be trained using standard
erates at a high level by processing session description
Figure 2: Overview of proposed NAD pipeline.




                                                                   Figure 4: TRH accuracy on training and validation splits. On
Figure 3: DAE reconstruction error on training and validation      the x axis we report the increasing number of epochs, while
splits. On the x axis we report the increasing number of epochs,   accuracy values are reported on the y axis.
while MSE values are reported on the y axis.

                                                                   Table 1
                                                                   Attacks Classifier, validation performance
supervised machine learning methods. It assigns the at-
tack typology to the input instance, with the choice of                      Anomaly        Precision   Recall   F1
classification algorithm impacting overall performance,                      DDoS           0.99        1.00     0.99
as detailed in the experimental section. The final decision                  IP sweep       1.00        1.00     1.00
of the framework is derived by considering the outputs                       Nmap sweep     0.98        0.87     0.92
of both the TRH and AC modules. If the TRH output is                         Port sweep     0.99        0.99     0.99
zero, indicating successful reconstruction by the DAE,
the input instance is classified as benign. If not, the input
instance is classified according to the attack type pre-           to reconstruct input samples. The final MSE scores were
dicted by the AC module. This approach leverages the               1.2944e-5 for training and 1.2402e-5 for validation. Ad-
DAE’s ability to recognize benign sessions, a capability           ditionally, further training for five epochs using both
honed through extensive training on numerous instances,            training and validation data reduced the training MSE to
while the AC module provides the specificity in attack             1.1759e-5.
typology classification when an attack is presumed.                   The TRH model, integrating latent features from the
   Our dataset has been provided with the NAD2021 chal-            DAE and its reconstruction error, was trained to classify
lenge [12], where participants are provided with traf-             samples as Normal (0) or Anomalous (1), using a similar
fic records from three specific dates, classified as either        early stopping strategy set at 10 epochs. Figure 4 show
normal traffic or a specific type of network attack. The           that training stops at epoch 202 with a training accuracy
challenge focuses on two primary types of attacks: (1)             𝐴𝑐𝑐𝑡𝑟𝑎𝑖𝑛 = 0.9697 and validation accuracy 𝐴𝑐𝑐𝑣𝑎𝑙 =
probing attacks, that involve attempts to extract data from        0.9698. These results indicate the model’s proficiency in
a targeted network, and (2) DDOS-Smurf attacks, which              differentiating between anomalous and normal samples.
are characterized by the use of numerous ICMP flows,                  The AC module, tasked with classifying attack samples
aimed at overwhelming and halting traffic to a specific            identified by the TRH, was trained using a RandomFor-
destination IP address.                                            est classifier. Performance metrics, including Precision,
   The DAE module was trained using an early stopping              Recall, and F1 scores, are detailed in the classification
mechanism, halting after three epochs without MSE im-              report. The confusion matrix provides further insights
provement on the validation set. Figure 3 show that                into the classifier’s performance across different attack
training stops at 69 epochs and the model easily learns            types. We report results in Table 1 (Precision, Recall and
Table 2                                                               4. AI Act and Biometrics
Attacks classifier, validation confusion matrix
                                                                      As AI becomes more integrated into daily life, cybersecu-
                  DDoS   IP sweep     Nmap sweep         Port sweep
                                                                      rity emerges as a critical concern. The AI Act, the first
DDoS              374    1            0                  0            global law on AI usage, serves as a key regulatory frame-
IP sweep          2      38310        0                  172          work within the European Union, emphasizing ethical
Nmap sweep        1      4            116                12
Port sweep        2      109          2                  12253
                                                                      considerations in cybersecurity. This law seeks a balance
                                                                      between technological innovation and the protection of
                                                                      core ethical values, ensuring AI is used responsibly. Par-
Table 3                                                               ticularly important within the AI Act is the role of cyber-
Test performance of DAE+TRH modules distinguishing anoma-             security for high-risk AI systems, which requires a com-
lous and normal samples                                               prehensive security approach. One significant challenge
            Class        Precision    Recall    F1
                                                                      addressed by the AI Act is the management of biometrics,
                                                                      acknowledging their sensitive nature and the privacy and
            Normal       1.00         0.96      0.98
                                                                      security implications for individuals. The act is partic-
            Anomaly      0.47         0.98      0.63
                                                                      ularly concerned with the ethical use of biometric data,
                                                                      such as fingerprints, and facial and vocal recognition, due
Table 4                                                               to the personal data protection it necessitates. To regu-
Test performance of the entire DAE+TRH+AC pipeline                    late the deployment of facial and biometric recognition
                                                                      technologies in public spaces, the AI Act sets strict rules,
          Class           Precision    Recall     F1
                                                                      allowing exceptions only in well-defined scenarios like
          DDoS            0.11         0.52       0.19                locating missing persons or preventing serious crimes
          Normal          1.00         0.96       0.98
          IP sweep        0.53         0.99       0.69                [13].
          Nmap sweep      0.96         0.83       0.89                   While the AI Act represents a significant step forward
          Port sweep      0.34         0.95       0.50                in balancing the benefits of artificial intelligence with
                                                                      the protection of fundamental rights, it also makes even
                                                                      more complex the landscape of challenges that remain.
F1 scores) and Table 2 (confusion matrix).                            Indeed, on one hand, stringent regulations are essential
   The final test assessed the combined performance of                for managing the risks associated with AI technologies
the DAE, TRH, and AC modules on the test set. Given the               and ensuring they adhere to ethical standards. On the
unbalanced nature of the data, Precision and Recall were              other hand, continuous research in the field of AI and
key metrics for evaluating the DAE+TRH’s ability to dis-              biometrics is critical. The need for advancing research in
tinguish between normal and anomalous samples. While                  biometrics is recognized globally, to the extent that nu-
these modules demonstrated high quality in differenti-                merous international competitions have been established
ating negatives from positives, there were limitations in             to challenge researchers in identifying fake biometrics.
identifying all anomalies. The cumulative errors from the             Over the years, the Naples’ CINI AI-IS node has made
DAE+TRH and AC modules are reflected in the overall                   significant contributions to the field of fake fingerprint
system performance. The aggregated 𝐹𝛼𝛽 score, evaluat-                detection. It has actively participated in several editions
ing the system across all classes, was recorded as 0.577,             of LIVDET1 , an international competition that challenges
indicating areas for improvement in the pipeline’s ability            researchers with the task of distinguishing between live
to accurately classify various types of network activities.           and fake fingerprints created through diverse techniques
   In conclusion, we introduced a streamlined and effec-              and spoofing materials. Our team has achieved notable
tive framework for Network Anomaly Detection (NAD).                   success in the last two editions, securing first place in
Our approach involves two main phases: (1) identify-                  one and second place in another. These accomplishments
ing anomalies using latent features generated by a Deep               were made possible through our innovative use of adver-
Denoising Autoencoder, and (2) classifying these anoma-               sarial learning techniques, which allowed us to perform
lies with a multi-label classifier. Despite potential error           a synthetic data augmentation able to improve the over-
propagation within the pipeline, our approach has shown               all performance of a liveness detector [14] achieving an
promising results. However, we observed a limitation in               accuracy over 90% on two dataset. More recently, ex-
the performance of the Threshold module (TRH), partic-                ploiting the experience matured over the years, we also
ularly in detecting attack samples, due to dataset imbal-             developed a new fake fingerprint crafting strategy that
ance. Future research will focus on implementing class-               can be used to physically cast a fake fingerprint able to
balancing techniques to improve the TRH module’s ef-                  bypass AI-based liveness detectors [15].
fectiveness and enhance the overall system performance.
                                                                      1
                                                                          https://sites.unica.it/livdet/
   These results not only anticipate future cybersecu-         [7] M. G. Gaber, M. Ahmed, H. Janicke, Malware de-
rity threats but also aid in formulating effective defence         tection with artificial intelligence: A systematic
mechanisms. To address this need while also protecting             literature review, ACM Computing Surveys (2023).
people from unwanted misuses, we advocate that one of              doi:10.1145/3638552.
the major challenges in the field of AI is education, to       [8] A. Damodaran, F. Di Troia, C. A. Visaggio, T. H.
promote a deeper understanding of the risks and ethi-              Austin, M. Stamp, A comparison of static, dynamic,
cal implications of AI and enable people to participate            and hybrid analysis for malware detection, Jour-
in an informed and conscious manner in public debate               nal of Computer Virology and Hacking Techniques
and decision-making regarding the use and regulation of            13 (2017) 1–12. doi:https://doi.org/10.1007/
these technologies. In pursuing a balance between tech-            s11416-015-0261-z.
nological innovation and the protection of fundamental         [9] F. O. Catak, A. F. Yazı, O. Elezaj, J. Ahmed, Deep
rights, it seems necessary to promote an open and inclu-           learning based sequential model for malware anal-
sive dialogue involving both developers and civil society          ysis using windows exe api calls, PeerJ Computer
stakeholders [16].                                                 Science 6 (2020) e285. URL: https://doi.org/10.7717/
                                                                   peerj-cs.285. doi:10.7717/peerj-cs.285.
                                                              [10] G. M., S. C. Sethuraman,          A comprehensive
Acknowledgments                                                    survey on deep learning based malware detec-
                                                                   tion techniques, Computer Science Review 47
This work was supported in part by the Piano Nazionale
                                                                   (2023) 100529. doi:https://doi.org/10.1016/
Ripresa Resilienza (PNRR) Ministero dell’Università e
                                                                   j.cosrev.2022.100529.
della Ricerca (MUR) Project under Grant PE0000013-FAIR
                                                              [11] S. Ali, T. Abuhmed, S. El-Sappagh, K. Muhammad,
                                                                   J. M. Alonso-Moral, R. Confalonieri, R. Guidotti,
References                                                         J. Del Ser, N. Díaz-Rodríguez, F. Herrera, Ex-
                                                                   plainable Artificial Intelligence (XAI): What we
 [1] S. Yan, J. Ren, W. Wang, L. Sun, W. Zhang, Q. Yu, A           know and what is left to attain Trustworthy
     survey of adversarial attack and defense methods              Artificial Intelligence, Information Fusion 99
     for malware classification in cyber security, IEEE            (2023) 101805. doi:https://doi.org/10.1016/
     Communications Surveys & Tutorials 25 (2023) 467–             j.inffus.2023.101805.
     496. doi:10.1109/COMST.2022.3225137.                     [12] L. Chen, S.-E. Weng, C.-J. Peng, H.-H. Shuai, W.-
 [2] N. Galloro, M. Polino, M. Carminati, A. Continella,           H. Cheng, Zyell-nctu nettraffic-1.0: A large-scale
     S. Zanero, A Systematical and longitudinal study of           dataset for real-world network anomaly detection,
     evasive behaviors in windows malware, Computers               2021. URL: https://arxiv.org/abs/2103.05767. doi:10.
     & Security 113 (2022) 102550. doi:https://doi.                48550/ARXIV.2103.05767.
     org/10.1016/j.cose.2021.102550.                          [13] T. Madiega, Artificial intelligence act, European
 [3] F. Zhong, X. Cheng, D. Yu, B. Gong, S. Song, J. Yu,           Parliament: European Parliamentary Research Ser-
     MalFox: Camouflaged Adversarial Malware Exam-                 vice (2021).
     ple Generation Based on Conv-GANs Against Black-         [14] A. Galli, M. Gravina, S. Marrone, D. Mattiello,
     Box Detectors, IEEE Transactions on Computers                 C. Sansone, Adversarial liveness detector: Leverag-
     (2023) 1–14. doi:10.1109/TC.2023.3236901.                     ing adversarial perturbations in fingerprint liveness
 [4] Z. Bazrafshan, H. Hashemi, S. M. H. Fard,                     detection, IET Biometrics 12 (2023) 102–111.
     A. Hamzeh, A survey on heuristic malware de-             [15] R. Casula, G. Orrù, S. Marrone, U. Gagliardini, G. L.
     tection techniques, in: The 5th Conference on In-             Marcialis, C. Sansone, Realistic fingerprint presen-
     formation and Knowledge Technology, IEEE, 2013,               tation attacks based on an adversarial approach,
     pp. 113–120. doi:10.1109/IKT.2013.6620049.                    IEEE Transactions on Information Forensics and
 [5] B. Cheng, J. Ming, E. A. Leal, H. Zhang, J. Fu,               Security (2023).
     G. Peng, J.-Y. Marion, {Obfuscation-Resilient} exe-      [16] J. Borenstein, A. Howard, Emerging challenges in ai
     cutable payload extraction from packed malware,               and the need for ai ethics education, AI and Ethics
     in: 30th USENIX Security Symposium (USENIX Se-                1 (2021) 61–65.
     curity 21), 2021, pp. 3451–3468.
 [6] M. Alazab, R. Layton, S. Venkatraman, P. Wat-
     ters, Malware detection based on structural and be-
     havioural features of api calls, in: International cy-
     ber resilience conference (1st: 2010), Edith Cowan
     University, 2010, pp. 1–10.