Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Berend, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.05204  [pdf, other

    math.PR cs.CR

    The Time for Reconstructing the Attack Graph in DDoS Attacks

    Authors: Dina Barak-Pelleg, Daniel Berend

    Abstract: Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service (DDoS) attacks are difficult to prevent and trace, thus posing a constant threat. One of the main defense techniques is to identify the source of attack by reconstructing th… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: 31 pages, 5 figures, 1 table

    MSC Class: Primary 60C05; 60F99; Secondary 60G70 ACM Class: G.3; I.6.6

  2. arXiv:2304.05123  [pdf, other

    cs.CR math.PR

    Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking

    Authors: Dina Barak-Pelleg, Daniel Berend, Thomas J. Robinson, Itamar Zimmerman

    Abstract: DoS and DDoS attacks are widely used and pose a constant threat. Here we explore Probability Packet Marking (PPM), one of the important methods for reconstructing the attack-graph and detect the attackers. We present two algorithms. Differently from others, their stopping time is not fixed a priori. It rather depends on the actual distance of the attacker from the victim. Our first algorithm retur… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: 30 pages, 4 figures, 4 tables

    MSC Class: 60C05 ACM Class: G.3; I.6.6

  3. arXiv:2105.02540  [pdf, other

    cs.SE cs.AI

    Distribution Awareness for AI System Testing

    Authors: David Berend

    Abstract: As Deep Learning (DL) is continuously adopted in many safety critical applications, its quality and reliability start to raise concerns. Similar to the traditional software development process, testing the DL software to uncover its defects at an early stage is an effective way to reduce risks after deployment. Although recent progress has been made in designing novel testing techniques for DL sof… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

    Comments: 2 pages, 1 figure, pre-print

  4. arXiv:2103.06297  [pdf, other

    cs.CR cs.LG

    TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

    Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici

    Abstract: Network intrusion attacks are a known threat. To detect such attacks, network intrusion detection systems (NIDSs) have been developed and deployed. These systems apply machine learning models to high-dimensional vectors of features extracted from network traffic to detect intrusions. Advances in NIDSs have made it challenging for attackers, who must execute attacks without being detected by these… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  5. arXiv:2010.16323  [pdf, other

    cs.CR cs.LG

    Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

    Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici

    Abstract: The performance of a machine learning-based malware classifier depends on the large and updated training set used to induce its model. In order to maintain an up-to-date training set, there is a need to continuously collect benign and malicious files from a wide range of sources, providing an exploitable target to attackers. In this study, we show how an attacker can launch a sophisticated and eff… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

  6. arXiv:2009.05283  [pdf, other

    cs.CV cs.AI cs.LG

    Fair and accurate age prediction using distribution aware data curation and augmentation

    Authors: Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu, Asaf Shabtai, Yuval Elovici

    Abstract: Deep learning-based facial recognition systems have experienced increased media attention due to exhibiting unfair behavior. Large enterprises, such as IBM, shut down their facial recognition and age prediction systems as a consequence. Age prediction is an especially difficult application with the issue of fairness remaining an open research problem (e.g., predicting age for different ethnicity e… ▽ More

    Submitted 16 November, 2021; v1 submitted 11 September, 2020; originally announced September 2020.

    Comments: Preprint, accepted at WACV'22

  7. arXiv:2003.13561  [pdf, other

    cs.LG math.PR stat.ML

    On Biased Random Walks, Corrupted Intervals, and Learning Under Adversarial Design

    Authors: Daniel Berend, Aryeh Kontorovich, Lev Reyzin, Thomas Robinson

    Abstract: We tackle some fundamental problems in probability theory on corrupted random processes on the integer line. We analyze when a biased random walk is expected to reach its bottommost point and when intervals of integer points can be detected under a natural model of noise. We apply these results to problems in learning thresholds and intervals under a new model for learning under adversarial design… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: 18 pages

  8. arXiv:1908.00089  [pdf, ps, other

    cs.DS math.PR

    A Model of Random Industrial SAT

    Authors: Dina Barak-Pelleg, Daniel Berend, J. C. Saunders

    Abstract: One of the most studied models of SAT is random SAT. In this model, instances are composed from clauses chosen uniformly randomly and independently of each other. This model may be unsatisfactory in that it fails to describe various features of SAT instances, arising in real-world applications. Various modifications have been suggested to define models of industrial SAT. Here, we focus mainly on t… ▽ More

    Submitted 3 February, 2022; v1 submitted 31 July, 2019; originally announced August 2019.

    Comments: 32 pages

  9. arXiv:1312.0451  [pdf, ps, other

    math.PR cs.LG stat.ML

    Consistency of weighted majority votes

    Authors: Daniel Berend, Aryeh Kontorovich

    Abstract: We revisit the classical decision-theoretic problem of weighted expert voting from a statistical learning perspective. In particular, we examine the consistency (both asymptotic and finitary) of the optimal Nitzan-Paroush weighted majority and related rules. In the case of known expert competence levels, we give sharp error estimates for the optimal rule. When the competence levels are unknown, th… ▽ More

    Submitted 21 January, 2014; v1 submitted 2 December, 2013; originally announced December 2013.

    MSC Class: 60C05; 60F15

  10. arXiv:1307.0720  [pdf, ps, other

    math.PR cs.FL math.CO

    The state complexity of random DFAs

    Authors: Daniel Berend, Aryeh Kontorovich

    Abstract: The state complexity of a Deterministic Finite-state automaton (DFA) is the number of states in its minimal equivalent DFA. We study the state complexity of random $n$-state DFAs over a $k$-symbol alphabet, drawn uniformly from the set $[n]^{[n]\times[k]}\times2^{[n]}$ of all such automata. We show that, with high probability, the latter is $α_k n + O(\sqrt n\log n)$ for a certain explicit constan… ▽ More

    Submitted 2 July, 2013; originally announced July 2013.

    MSC Class: 60C05; 68Q45

  11. arXiv:1206.6544  [pdf, ps, other

    cs.IT

    Minimum KL-divergence on complements of $L_1$ balls

    Authors: Daniel Berend, Peter Harremoës, Aryeh Kontorovich

    Abstract: Pinsker's widely used inequality upper-bounds the total variation distance $||P-Q||_1$ in terms of the Kullback-Leibler divergence $D(P||Q)$. Although in general a bound in the reverse direction is impossible, in many applications the quantity of interest is actually $D^*(P,\eps)$ --- defined, for an arbitrary fixed $P$, as the infimum of $D(P||Q)$ over all distributions $Q$ that are $\eps$-far aw… ▽ More

    Submitted 20 February, 2014; v1 submitted 27 June, 2012; originally announced June 2012.

    Comments: A previous version had the title "A Reverse Pinsker Inequality"

    MSC Class: 60F10; 94A15

  12. arXiv:1102.4885  [pdf, ps, other

    cs.DM

    The Tower of Hanoi problem on Path_h graphs

    Authors: Daniel Berend, Amir Sapir, Shay Solomon

    Abstract: The generalized Tower of Hanoi problem with h \ge 4 pegs is known to require a sub-exponentially fast growing number of moves in order to transfer a pile of n disks from one peg to another. In this paper we study the Path_h variant, where the pegs are placed along a line, and disks can be moved from a peg to its nearest neighbor(s) only. Whereas in the simple variant there are h(h-1)/2 possible… ▽ More

    Submitted 23 February, 2011; originally announced February 2011.

    Comments: 32 pages, 2 figures