攻撃タイプ

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19
リソース使用分析
攻撃タイプ
防御手法

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18
アルゴリズム設計
プロンプトインジェクション
攻撃タイプ

Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol (MCP) Ecosystem

Authors: Hao Song, Yiming Shen, Wenxuan Luo, Leixin Guo, Ting Chen, Jiashui Wang, Beibei Li, Xiaosong Zhang, Jiachi Chen | Published: 2025-05-31 | Updated: 2025-08-20
インダイレクトプロンプトインジェクション
プロンプトインジェクション
攻撃タイプ

A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles

Authors: Md Ashraf Uddin, Nam H. Chu, Reza Rafeh, Mutaz Barika | Published: 2025-05-22
攻撃タイプ
連合学習
階層型分類モデル

AGENTFUZZER: Generic Black-Box Fuzzing for Indirect Prompt Injection against LLM Agents

Authors: Zhun Wang, Vincent Siu, Zhe Ye, Tianneng Shi, Yuzhou Nie, Xuandong Zhao, Chenguang Wang, Wenbo Guo, Dawn Song | Published: 2025-05-09 | Updated: 2025-05-21
インダイレクトプロンプトインジェクション
ファジング
攻撃タイプ

Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models

Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06
プロンプトリーキング
攻撃タイプ
攻撃の分類

Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems

Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06
攻撃タイプ
敵対的サンプル
機械学習技術

Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks

Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01
バックドア攻撃
ポイズニング
攻撃タイプ

Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs

Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30
LLM性能評価
RAGへのポイズニング攻撃
攻撃タイプ

Traceback of Poisoning Attacks to Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30
RAGへのポイズニング攻撃
攻撃タイプ
毒データの検知