Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Liebowitz, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04758  [pdf, other

    cs.CR cs.AI cs.CL

    Honeyfile Camouflage: Hiding Fake Files in Plain Sight

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Honeyfiles are a particularly useful type of honeypot: fake files deployed to detect and infer information from malicious behaviour. This paper considers the challenge of naming honeyfiles so they are camouflaged when placed amongst real files in a file system. Based on cosine distances in semantic vector spaces, we develop two metrics for filename camouflage: one based on simple averaging and one… ▽ More

    Submitted 10 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 3rd Workshop on the security implications of Deepfakes and Cheapfakes (WDC) co-located at ACM ASIACCS 2024

  2. arXiv:2404.04854  [pdf, other

    cs.LG cs.AI cs.CR

    Contextual Chart Generation for Cyber Deception

    Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

    Abstract: Honeyfiles are security assets designed to attract and detect intruders on compromised systems. Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data. Interaction with a honeyfile reveals the presence of an intruder, and can provide insights into their goals and intentions. Their practical use, however, is limited by the time… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 13 pages including references

  3. arXiv:2312.11735  [pdf, other

    cs.LG

    Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

    Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios. Current deep learning techniques to address multiple-output problems are based on two main methodologies: (1) mixture density networks, which suffer from poor stability at high dimensions, or (2) multiple choice learni… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: To appear in Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24). 13 pages (9 main, 4 appendix)

  4. arXiv:2305.18769  [pdf

    cs.CV cs.LG

    DualVAE: Controlling Colours of Generated and Real Images

    Authors: Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

    Abstract: Colour controlled image generation and manipulation are of interest to artists and graphic designers. Vector Quantised Variational AutoEncoders (VQ-VAEs) with autoregressive (AR) prior are able to produce high quality images, but lack an explicit representation mechanism to control colour attributes. We introduce DualVAE, a hybrid representation model that provides such control by learning disenta… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  5. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  6. arXiv:2203.07580  [pdf, other

    cs.CL cs.CR cs.LG

    TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

    Abstract: Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  7. arXiv:2203.06793  [pdf, other

    cs.CL

    Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Each and every organisation releases information in a variety of forms ranging from annual reports to legal proceedings. Such documents may contain sensitive information and releasing them openly may lead to the leakage of confidential information. Detection of sentences that contain sensitive information in documents can help organisations prevent the leakage of valuable confidential information.… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  8. arXiv:2111.12835  [pdf, other

    cs.DB cs.LG

    SchemaDB: Structures in Relational Datasets

    Authors: Cody James Christopher, Kristen Moore, David Liebowitz

    Abstract: In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats. Databases are not commonly shared publicly for reasons of privacy and security, so schemata are not available for study. Consequently, an understanding of database structures in the wild is lacking, and most examples found publicly belong to common development frameworks or… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

    Comments: Draft

  9. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

    Authors: Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey

    Abstract: Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves. However, despite being relatively cheap to deploy, the generation of realistic content at scale is very costly, due to the fact that rich, interactive deceptive technologies are largely hand-crafted. With recent improvements in Machine Learning, we now have the opportunity to b… ▽ More

    Submitted 23 November, 2022; v1 submitted 21 November, 2021; originally announced November 2021.

    Journal ref: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)