Skip to main content

Showing 1–22 of 22 results for author: Bowen, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17576  [pdf, other

    cs.CR cs.AI cs.LG

    Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations

    Authors: Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen

    Abstract: Ransomware presents a significant and increasing threat to individuals and organizations by encrypting their systems and not releasing them until a large fee has been extracted. To bolster preparedness against potential attacks, organizations commonly conduct red teaming exercises, which involve simulated attacks to assess existing security measures. This paper proposes a novel approach utilizing… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

    Authors: Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

    Abstract: Command and control (C2) channels are an essential component of many types of cyber attacks, as they enable attackers to remotely control their malware-infected machines and execute harmful actions, such as propagating malicious code across networks, exfiltrating confidential data, or initiating distributed denial of service (DDoS) attacks. Identifying these C2 channels is therefore crucial in hel… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  3. Discovering Command and Control Channels Using Reinforcement Learning

    Authors: Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

    Abstract: Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: SoutheastCon 2023. IEEE, 2023

  4. arXiv:2312.04587  [pdf

    cs.CR cs.LG

    FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

    Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

    Abstract: Federated learning has created a decentralized method to train a machine learning model without needing direct access to client data. The main goal of a federated learning architecture is to protect the privacy of each client while still contributing to the training of the global model. However, the main advantage of privacy in federated learning is also the easiest aspect to exploit. Without bein… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted to IEEE CCWC 2024

  5. arXiv:2312.00051  [pdf, other

    cs.CR cs.AI cs.LG

    MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

    Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty

    Abstract: The membership inference attack (MIA) is a popular paradigm for compromising the privacy of a machine learning (ML) model. MIA exploits the natural inclination of ML models to overfit upon the training data. MIAs are trained to distinguish between training and testing prediction confidence to infer membership information. Federated Learning (FL) is a privacy-preserving ML paradigm that enables mul… ▽ More

    Submitted 28 November, 2023; originally announced December 2023.

    Comments: 6 pages, 5 figures, Accepted to be published in ICNC 23

  6. arXiv:2311.03084  [pdf, other

    cs.CL cs.AI

    A Simple yet Efficient Ensemble Approach for AI-generated Text Detection

    Authors: Harika Abburi, Kalyani Roy, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

    Abstract: Recent Large Language Models (LLMs) have demonstrated remarkable capabilities in generating text that closely resembles human writing across wide range of styles and genres. However, such capabilities are prone to potential abuse, such as fake news generation, spam email creation, and misuse in academic assignments. Hence, it is essential to build automated approaches capable of distinguishing bet… ▽ More

    Submitted 7 November, 2023; v1 submitted 6 November, 2023; originally announced November 2023.

  7. arXiv:2310.03667  [pdf, other

    cs.CR

    Enhancing Exfiltration Path Analysis Using Reinforcement Learning

    Authors: Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen

    Abstract: Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  8. arXiv:2309.17001  [pdf, other

    cs.LG cs.AI

    A Closer Look at Bearing Fault Classification Approaches

    Authors: Harika Abburi, Tanya Chaudhary, Haider Ilyas, Lakshmi Manne, Deepak Mittal, Don Williams, Derek Snaidauf, Edward Bowen, Balaji Veeramani

    Abstract: Rolling bearing fault diagnosis has garnered increased attention in recent years owing to its presence in rotating machinery across various industries, and an ever increasing demand for efficient operations. Prompt detection and accurate prediction of bearing failures can help reduce the likelihood of unexpected machine downtime and enhance maintenance schedules, averting lost productivity. Recent… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

  9. arXiv:2309.07755  [pdf, other

    cs.CL cs.AI

    Generative AI Text Classification using Ensemble LLM Approaches

    Authors: Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

    Abstract: Large Language Models (LLMs) have shown impressive performance across a variety of Artificial Intelligence (AI) and natural language processing tasks, such as content creation, report generation, etc. However, unregulated malign application of these models can create undesirable consequences such as generation of fake news, plagiarism, etc. As a result, accurate detection of AI-generated language… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  10. arXiv:2309.00700  [pdf, other

    cs.CR

    Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

    Authors: Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen

    Abstract: We present a novel approach to identify ransomware campaigns derived from attack timelines representations within victim networks. Malicious activity profiles developed from multiple alert sources support the construction of alert graphs. This approach enables an effective and scalable representation of the attack timelines where individual nodes represent malicious activity detections with connec… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: Preprint. Under Review

  11. arXiv:2306.03733  [pdf, other

    cs.CR cs.CL

    A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

    Authors: Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen

    Abstract: The increasing reliance on the internet has led to the proliferation of a diverse set of web-browsers and operating systems (OSs) capable of browsing the web. User agent strings (UASs) are a component of web browsing that are transmitted with every Hypertext Transfer Protocol (HTTP) request. They contain information about the client device and software, which is used by web servers for various pur… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: Accepted to the International Conference on Machine Learning and Cybernetics (ICMLC) 2023

  12. arXiv:2305.15488  [pdf, other

    cs.CR

    Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks

    Authors: Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen

    Abstract: In today's interconnected digital landscape, the proliferation of malware poses a significant threat to the security and stability of computer networks and systems worldwide. As the complexity of malicious tactics, techniques, and procedures (TTPs) continuously grows to evade detection, so does the need for advanced methods capable of capturing and characterizing malware behavior. The current stat… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 10 pages, 6 tables, 2 figures. Preprint, under review

  13. arXiv:2305.00664  [pdf, other

    cs.LG

    EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs

    Authors: Haohui Wang, Yuzhen Mao, Yujun Yan, Yaoqing Yang, Jianhui Sun, Kevin Choi, Balaji Veeramani, Alison Hu, Edward Bowen, Tyler Cody, Dawei Zhou

    Abstract: Non-IID transfer learning on graphs is crucial in many high-stakes domains. The majority of existing works assume stationary distribution for both source and target domains. However, real-world graphs are intrinsically dynamic, presenting challenges in terms of domain evolution and dynamic discrepancy between source and target domains. To bridge the gap, we shift the problem to the dynamic setting… ▽ More

    Submitted 31 May, 2024; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted at ICML 2024

  14. arXiv:2211.03027  [pdf, other

    cs.LG cs.CR cs.NI

    Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

    Authors: Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while… ▽ More

    Submitted 6 November, 2022; originally announced November 2022.

  15. arXiv:2211.00441  [pdf, other

    cs.CR cs.AI cs.LG

    Zero Day Threat Detection Using Metric Learning Autoencoders

    Authors: Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

    Abstract: The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale. The diverse nature of normal behavior along with the huge landscape of attack types makes deep learning methods an attractive option for their ability to capture highly-nonlinear behavior patterns. In this paper, the autho… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 8 pages, accepted to ICMLA 2022

  16. arXiv:2210.06614  [pdf, other

    cs.LG cs.AI cs.CR

    Anomaly Detection via Federated Learning

    Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani

    Abstract: Machine learning has helped advance the field of anomaly detection by incorporating classifiers and autoencoders to decipher between normal and anomalous behavior. Additionally, federated learning has provided a way for a global model to be trained with multiple clients' data without requiring the client to directly share their data. This paper proposes a novel anomaly detector via federated learn… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

  17. arXiv:2208.13524  [pdf, other

    cs.CR cs.LG

    Lateral Movement Detection Using User Behavioral Analysis

    Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated det… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: Contains 5 figures

  18. arXiv:2208.09953  [pdf, other

    stat.ML cs.LG stat.AP stat.ME

    Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm

    Authors: J. Lian, K. Choi, B. Veeramani, A. Hu, L. Freeman, E. Bowen, X. Deng

    Abstract: The quality of Artificial Intelligence (AI) algorithms is of significant importance for confidently adopting algorithms in various applications such as cybersecurity, healthcare, and autonomous driving. This work presents a principled framework of using a design-of-experimental approach to systematically evaluate the quality of AI algorithms, named as Do-AIQ. Specifically, we focus on investigatin… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

  19. arXiv:2205.02298  [pdf, other

    cs.CR cs.AI

    Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

    Authors: Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been costing organizations millions of dollars to remediate. The increasing expansion of network attack surfaces and the exponentially growing number of ass… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 11 pages, 6 figures, submitting to NeurIPS 2022

  20. arXiv:2201.12416  [pdf, other

    cs.CR cs.LG cs.NI

    Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

    Authors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w… ▽ More

    Submitted 25 April, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)

  21. arXiv:2011.00088  [pdf

    q-bio.NC cs.SD

    Towards a perceptual distance metric for auditory stimuli

    Authors: Sarah Oh, Elijah FW Bowen, Antonio Rodriguez, Damian Sowinski, Eva Childers, Annemarie Brown, Laura Ray, Richard Granger

    Abstract: Although perceptual (dis)similarity between sensory stimuli seems akin to distance, measuring the Euclidean distance between vector representations of auditory stimuli is a poor estimator of subjective dissimilarity. In hearing, nonlinear response patterns, interactions between stimulus components, temporal effects, and top-down modulation transform the information contained in incoming frequency-… ▽ More

    Submitted 30 October, 2020; originally announced November 2020.

  22. arXiv:2008.06939  [pdf

    cs.CV q-bio.NC

    Visual stream connectivity predicts assessments of image quality

    Authors: Elijah Bowen, Antonio Rodriguez, Damian Sowinski, Richard Granger

    Abstract: Some biological mechanisms of early vision are comparatively well understood, but they have yet to be evaluated for their ability to accurately predict and explain human judgments of image similarity. From well-studied simple connectivity patterns in early vision, we derive a novel formalization of the psychophysics of similarity, showing the differential geometry that provides accurate and explan… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.