Zum Hauptinhalt springen

Showing 1–22 of 22 results for author: Cody, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.03775  [pdf, ps, other

    cs.LG cs.AI eess.SY

    A Systems Theoretic Approach to Online Machine Learning

    Authors: Anli du Preez, Peter A. Beling, Tyler Cody

    Abstract: The machine learning formulation of online learning is incomplete from a systems theoretic perspective. Typically, machine learning research emphasizes domains and tasks, and a problem solving worldview. It focuses on algorithm parameters, features, and samples, and neglects the perspective offered by considering system structure and system behavior or dynamics. Online learning is an active field… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted by the 18th Annual IEEE International Systems Conference (SysCon)

  2. arXiv:2404.03769  [pdf, ps, other

    cs.SE cs.LG eess.SY

    On Extending the Automatic Test Markup Language (ATML) for Machine Learning

    Authors: Tyler Cody, Bingtong Li, Peter A. Beling

    Abstract: This paper addresses the urgent need for messaging standards in the operational test and evaluation (T&E) of machine learning (ML) applications, particularly in edge ML applications embedded in systems like robots, satellites, and unmanned vehicles. It examines the suitability of the IEEE Standard 1671 (IEEE Std 1671), known as the Automatic Test Markup Language (ATML), an XML-based standard origi… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted by the 18th Annual IEEE International Systems Conference (SysCon)

  3. Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

    Authors: Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

    Abstract: Command and control (C2) channels are an essential component of many types of cyber attacks, as they enable attackers to remotely control their malware-infected machines and execute harmful actions, such as propagating malicious code across networks, exfiltrating confidential data, or initiating distributed denial of service (DDoS) attacks. Identifying these C2 channels is therefore crucial in hel… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  4. Discovering Command and Control Channels Using Reinforcement Learning

    Authors: Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

    Abstract: Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: SoutheastCon 2023. IEEE, 2023

  5. arXiv:2312.17300  [pdf, other

    cs.CR cs.LG

    Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

    Authors: Padmaksha Roy, Tyler Cody, Himanshu Singhal, Kevin Choi, Ming Jin

    Abstract: Domain generalization focuses on leveraging knowledge from multiple related domains with ample training data and labels to enhance inference on unseen in-distribution (IN) and out-of-distribution (OOD) domains. In our study, we introduce a two-phase representation learning technique using multi-task learning. This approach aims to cultivate a latent space from features spanning multiple domains, e… ▽ More

    Submitted 23 April, 2024; v1 submitted 28 December, 2023; originally announced December 2023.

  6. arXiv:2311.10786  [pdf, other

    cs.AI eess.SY

    A Systems-Theoretical Formalization of Closed Systems

    Authors: Niloofar Shadab, Tyler Cody, Alejandro Salado, Peter Beling

    Abstract: There is a lack of formalism for some key foundational concepts in systems engineering. One of the most recently acknowledged deficits is the inadequacy of systems engineering practices for engineering intelligent systems. In our previous works, we proposed that closed systems precepts could be used to accomplish a required paradigm shift for the systems engineering of intelligent systems. However… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 11 pages, 3 figures

  7. arXiv:2310.06800  [pdf, other

    cs.SE cs.LG

    Test & Evaluation Best Practices for Machine Learning-Enabled Systems

    Authors: Jaganmohan Chandrasekaran, Tyler Cody, Nicola McCarthy, Erin Lanus, Laura Freeman

    Abstract: Machine learning (ML) - based software systems are rapidly gaining adoption across various domains, making it increasingly essential to ensure they perform as intended. This report presents best practices for the Test and Evaluation (T&E) of ML-enabled software systems across its lifecycle. We categorize the lifecycle of ML-enabled software systems into three stages: component, integration and dep… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  8. arXiv:2310.03667  [pdf, other

    cs.CR

    Enhancing Exfiltration Path Analysis Using Reinforcement Learning

    Authors: Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen

    Abstract: Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  9. arXiv:2305.00664  [pdf, other

    cs.LG

    EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs

    Authors: Haohui Wang, Yuzhen Mao, Yujun Yan, Yaoqing Yang, Jianhui Sun, Kevin Choi, Balaji Veeramani, Alison Hu, Edward Bowen, Tyler Cody, Dawei Zhou

    Abstract: Non-IID transfer learning on graphs is crucial in many high-stakes domains. The majority of existing works assume stationary distribution for both source and target domains. However, real-world graphs are intrinsically dynamic, presenting challenges in terms of domain evolution and dynamic discrepancy between source and target domains. To bridge the gap, we shift the problem to the dynamic setting… ▽ More

    Submitted 12 August, 2024; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted at ICML 2024

  10. arXiv:2302.14616  [pdf, other

    cs.LG cs.SE stat.ML

    Metric Learning Improves the Ability of Combinatorial Coverage Metrics to Anticipate Classification Error

    Authors: Tyler Cody, Laura Freeman

    Abstract: Machine learning models are increasingly used in practice. However, many machine learning methods are sensitive to test or operational data that is dissimilar to training data. Out-of-distribution (OOD) data is known to increase the probability of error and research into metrics that identify what dissimilarities in data affect model performance is on-going. Recently, combinatorial coverage metric… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: Accepted 2022 IEEE International Conference on Software Testing International Workshop on Combinatorial Testing (IEEE ICST IWCT)

  11. arXiv:2302.14567  [pdf, other

    cs.LG stat.ML

    Active Learning with Combinatorial Coverage

    Authors: Sai Prathyush Katragadda, Tyler Cody, Peter Beling, Laura Freeman

    Abstract: Active learning is a practical field of machine learning that automates the process of selecting which data to label. Current methods are effective in reducing the burden of data labeling but are heavily model-reliant. This has led to the inability of sampled data to be transferred to new models as well as issues with sampling bias. Both issues are of crucial concern in machine learning deployment… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: Accepted 2022 IEEE International Conference on Machine Learning and Applications (IEEE ICMLA)

  12. arXiv:2211.03027  [pdf, other

    cs.LG cs.CR cs.NI

    Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

    Authors: Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while… ▽ More

    Submitted 6 November, 2022; originally announced November 2022.

  13. arXiv:2208.03316  [pdf, other

    cs.LG cs.AI eess.SY

    Homomorphisms Between Transfer, Multi-Task, and Meta-Learning Systems

    Authors: Tyler Cody

    Abstract: Transfer learning, multi-task learning, and meta-learning are well-studied topics concerned with the generalization of knowledge across learning tasks and are closely related to general intelligence. But, the formal, general systems differences between them are underexplored in the literature. This lack of systems-level formalism leads to difficulties in coordinating related, inter-disciplinary en… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: The 15th International Conference on Artificial General Intelligence (AGI-22)

  14. arXiv:2208.02837  [pdf, other

    cs.AI eess.SY

    Core and Periphery as Closed-System Precepts for Engineering General Intelligence

    Authors: Tyler Cody, Niloofar Shadab, Alejandro Salado, Peter Beling

    Abstract: Engineering methods are centered around traditional notions of decomposition and recomposition that rely on partitioning the inputs and outputs of components to allow for component-level properties to hold after their composition. In artificial intelligence (AI), however, systems are often expected to influence their environments, and, by way of their environments, to influence themselves. Thus, i… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: The 15th International Conference on Artificial General Intelligence (AGI-22)

  15. arXiv:2206.06934  [pdf, other

    cs.CR cs.NI

    A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs

    Authors: Tyler Cody

    Abstract: This paper considers key challenges to using reinforcement learning (RL) with attack graphs to automate penetration testing in real-world applications from a systems perspective. RL approaches to automated penetration testing are actively being developed, but there is no consensus view on the representation of computer networks with which RL should be interacting. Moreover, there are significant o… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  16. arXiv:2201.12428  [pdf, other

    cs.LG cs.SE stat.ML

    Systematic Training and Testing for Machine Learning Using Combinatorial Interaction Testing

    Authors: Tyler Cody, Erin Lanus, Daniel D. Doyle, Laura Freeman

    Abstract: This paper demonstrates the systematic use of combinatorial coverage for selecting and characterizing test and training sets for machine learning models. The presented work adapts combinatorial interaction testing, which has been successfully leveraged in identifying faults in software testing, to characterize data used in machine learning. The MNIST hand-written digits data is used to demonstrate… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  17. arXiv:2201.12416  [pdf, other

    cs.CR cs.LG cs.NI

    Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

    Authors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w… ▽ More

    Submitted 25 April, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)

  18. arXiv:2111.14766  [pdf, other

    cs.AI eess.SY

    Mesarovician Abstract Learning Systems

    Authors: Tyler Cody

    Abstract: The solution methods used to realize artificial general intelligence (AGI) may not contain the formalism needed to adequately model and characterize AGI. In particular, current approaches to learning hold notions of problem domain and problem task as fundamental precepts, but it is hardly apparent that an AGI encountered in the wild will be discernable into a set of domain-task pairings. Nor is it… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: The 14th International Conference on Artificial General Intelligence (AGI-21)

  19. arXiv:2108.09358  [pdf, other

    cs.CR cs.LG cs.NI

    Crown Jewels Analysis using Reinforcement Learning with Attack Graphs

    Authors: Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park

    Abstract: Cyber attacks pose existential threats to nations and enterprises. Current practice favors piece-wise analysis using threat-models in the stead of rigorous cyber terrain analysis and intelligence preparation of the battlefield. Automated penetration testing using reinforcement learning offers a new and promising approach for developing methodologies that are driven by network structure and cyber t… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  20. arXiv:2108.07124  [pdf, other

    cs.LG cs.CR cs.NI

    Using Cyber Terrain in Reinforcement Learning for Penetration Testing

    Authors: Rohit Gangupantulu, Tyler Cody, Paul Park, Abdul Rahman, Logan Eisenbeiser, Dan Radke, Ryan Clark

    Abstract: Reinforcement learning (RL) has been applied to attack graphs for penetration testing, however, trained agents do not reflect reality because the attack graphs lack operational nuances typically captured within the intelligence preparation of the battlefield (IPB) that include notions of (cyber) terrain. In particular, current practice constructs attack graphs exclusively using the Common Vulnerab… ▽ More

    Submitted 4 August, 2022; v1 submitted 16 August, 2021; originally announced August 2021.

    Comments: 2022 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)

  21. arXiv:2107.01196  [pdf, other

    cs.LG eess.SY math.OC

    A Systems Theory of Transfer Learning

    Authors: Tyler Cody, Peter A. Beling

    Abstract: Existing frameworks for transfer learning are incomplete from a systems theoretic perspective. They place emphasis on notions of domain and task, and neglect notions of structure and behavior. In doing so, they limit the extent to which formalism can be carried through into the elaboration of their frameworks. Herein, we use Mesarovician systems theory to define transfer learning as a relation on… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  22. Empirically Measuring Transfer Distance for System Design and Operation

    Authors: Tyler Cody, Stephen Adams, Peter A. Beling

    Abstract: Classical machine learning approaches are sensitive to non-stationarity. Transfer learning can address non-stationarity by sharing knowledge from one system to another, however, in areas like machine prognostics and defense, data is fundamentally limited. Therefore, transfer learning algorithms have little, if any, examples from which to learn. Herein, we suggest that these constraints on algorith… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.