Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Shaha, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.00441  [pdf, other

    cs.CR cs.AI cs.LG

    Zero Day Threat Detection Using Metric Learning Autoencoders

    Authors: Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

    Abstract: The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale. The diverse nature of normal behavior along with the huge landscape of attack types makes deep learning methods an attractive option for their ability to capture highly-nonlinear behavior patterns. In this paper, the autho… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 8 pages, accepted to ICMLA 2022

  2. arXiv:2208.13524  [pdf, other

    cs.CR cs.LG

    Lateral Movement Detection Using User Behavioral Analysis

    Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated det… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: Contains 5 figures

  3. arXiv:2205.02298  [pdf, other

    cs.CR cs.AI

    Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

    Authors: Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been costing organizations millions of dollars to remediate. The increasing expansion of network attack surfaces and the exponentially growing number of ass… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 11 pages, 6 figures, submitting to NeurIPS 2022