Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Yang, S J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11006  [pdf, other

    cs.CL cs.AI cs.LG cs.PF

    Evaluating the Efficacy of Foundational Models: Advancing Benchmarking Practices to Enhance Fine-Tuning Decision-Making

    Authors: Oluyemi Enoch Amujo, Shanchieh Jay Yang

    Abstract: Recently, large language models (LLMs) have expanded into various domains. However, there remains a need to evaluate how these models perform when prompted with commonplace queries compared to domain-specific queries, which may be useful for benchmarking prior to fine-tuning for domain-specific downstream tasks. This study evaluates LLMs, specifically Gemma-2B and Gemma-7B, across diverse domains,… ▽ More

    Submitted 20 August, 2024; v1 submitted 25 June, 2024; originally announced July 2024.

    Comments: 10 pages, 5 figures, 2 tables, and algorithms

  2. arXiv:2401.00280  [pdf, other

    cs.CR cs.LG

    Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation

    Authors: Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang

    Abstract: Tactics, Techniques, and Procedures (TTPs) outline the methods attackers use to exploit vulnerabilities. The interpretation of TTPs in the MITRE ATT&CK framework can be challenging for cybersecurity practitioners due to presumed expertise and complex dependencies. Meanwhile, advancements with Large Language Models (LLMs) have led to recent surge in studies exploring its uses in cybersecurity opera… ▽ More

    Submitted 21 July, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

  3. arXiv:2312.03419  [pdf, other

    cs.CR

    Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models

    Authors: Sze Jue Yang, Chinh D. La, Quang H. Nguyen, Kok-Seng Wong, Anh Tuan Tran, Chee Seng Chan, Khoa D. Doan

    Abstract: Backdoor attacks, representing an emerging threat to the integrity of deep neural networks, have garnered significant attention due to their ability to compromise deep learning systems clandestinely. While numerous backdoor attacks occur within the digital realm, their practical implementation in real-world prediction systems remains limited and vulnerable to disturbances in the physical world. Co… ▽ More

    Submitted 15 March, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

  4. arXiv:2308.16684  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

    Authors: Sze Jue Yang, Quang Nguyen, Chee Seng Chan, Khoa D. Doan

    Abstract: The vulnerabilities to backdoor attacks have recently threatened the trustworthiness of machine learning models in practical applications. Conventional wisdom suggests that not everyone can be an attacker since the process of designing the trigger generation algorithm often involves significant effort and extensive experimentation to ensure the attack's stealthiness and effectiveness. Alternativel… ▽ More

    Submitted 3 September, 2023; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: 14 pages. This paper shows everyone can mount a powerful and stealthy backdoor attack with the widely-used lossy image compression

  5. arXiv:2308.14376  [pdf, other

    cs.LG cs.AI cs.CR

    Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

    Authors: Andrea Corsini, Shanchieh Jay Yang

    Abstract: Machine learning (ML) has become increasingly popular in network intrusion detection. However, ML-based solutions always respond regardless of whether the input data reflects known patterns, a common issue across safety-critical applications. While several proposals exist for detecting Out-Of-Distribution (OOD) in other fields, it remains unclear whether these approaches can effectively identify n… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  6. arXiv:2306.14062  [pdf, other

    cs.AI cs.CR

    On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

    Authors: Reza Fayyazi, Shanchieh Jay Yang

    Abstract: The volume, variety, and velocity of change in vulnerabilities and exploits have made incident threat analysis challenging with human expertise and experience along. Tactics, Techniques, and Procedures (TTPs) are to describe how and why attackers exploit vulnerabilities. However, a TTP description written by one security professional can be interpreted very differently by another, leading to confu… ▽ More

    Submitted 22 August, 2023; v1 submitted 24 June, 2023; originally announced June 2023.

  7. arXiv:2303.07533  [pdf, other

    eess.AS cs.SD

    Speech Intelligibility Classifiers from 550k Disordered Speech Samples

    Authors: Subhashini Venugopalan, Jimmy Tobin, Samuel J. Yang, Katie Seaver, Richard J. N. Cave, Pan-Pan Jiang, Neil Zeghidour, Rus Heywood, Jordan Green, Michael P. Brenner

    Abstract: We developed dysarthric speech intelligibility classifiers on 551,176 disordered speech samples contributed by a diverse set of 468 speakers, with a range of self-reported speaking disorders and rated for their overall intelligibility on a five-point scale. We trained three models following different deep learning approaches and evaluated them on ~94K utterances from 100 speakers. We further found… ▽ More

    Submitted 15 March, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: ICASSP 2023 camera-ready

  8. arXiv:2212.13941  [pdf, other

    cs.CR cs.AI cs.LG

    HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

    Authors: Stephen Moskal, Shanchieh Jay Yang

    Abstract: With growing sophistication and volume of cyber attacks combined with complex network structures, it is becoming extremely difficult for security analysts to corroborate evidences to identify multistage campaigns on their network. This work develops HeAT (Heated Alert Triage): given a critical indicator of compromise (IoC), e.g., a severe IDS alert, HeAT produces a HeATed Attack Campaign (HAC) dep… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  9. arXiv:2107.02783  [pdf, other

    cs.CR cs.LG

    SAGE: Intrusion Alert-driven Attack Graph Extractor

    Authors: Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang

    Abstract: Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant vulnerability scanning and expert-crafted AGs. We propose… ▽ More

    Submitted 14 October, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: Appeared at VizSec '21 (proceedings) and KDD AI4Cyber '21 (without proceedings)

  10. On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

    Authors: Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese

    Abstract: Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS). Specifically, attention has been given to sequential learning models, due to their ability to extract the temporal characteristics of Network traffic Flows (NetFlows), and use them for NIDS tasks. However, the applications of these sequential models often consist of t… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

  11. arXiv:2105.03855  [pdf

    cs.LG stat.ML

    GMOTE: Gaussian based minority oversampling technique for imbalanced classification adapting tail probability of outliers

    Authors: Seung Jee Yang, Kyung Joon Cha

    Abstract: Classification of imbalanced data is one of the common problems in the recent field of data mining. Imbalanced data substantially affects the performance of standard classification models. Data-level approaches mainly use the oversampling methods to solve the problem, such as synthetic minority oversampling Technique (SMOTE). However, since the methods such as SMOTE generate instances by linear in… ▽ More

    Submitted 9 May, 2021; originally announced May 2021.

    Comments: 20 pages, 6 figures

    MSC Class: 62P99

  12. arXiv:2103.13902  [pdf, other

    cs.CR

    Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts

    Authors: Shanchieh Jay Yang, Ahmet Okutan, Gordon Werner, Shao-Hsuan Su, Ayush Goel, Nathan D. Cahill

    Abstract: Critical and sophisticated cyberattacks often take multitudes of reconnaissance, exploitations, and obfuscation techniques to penetrate through well protected enterprise networks. The discovery and detection of attacks, though needing continuous efforts, is no longer sufficient. Security Operation Center (SOC) analysts are overwhelmed by the significant volume of intrusion alerts without being abl… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  13. arXiv:2004.04306  [pdf, other

    eess.IV cs.CV cs.LG

    Physics-enhanced machine learning for virtual fluorescence microscopy

    Authors: Colin L. Cooke, Fanjie Kong, Amey Chaware, Kevin C. Zhou, Kanghyun Kim, Rong Xu, D. Michael Ando, Samuel J. Yang, Pavan Chandra Konda, Roarke Horstmeyer

    Abstract: This paper introduces a new method of data-driven microscope design for virtual fluorescence microscopy. Our results show that by including a model of illumination within the first layers of a deep convolutional neural network, it is possible to learn task-specific LED patterns that substantially improve the ability to infer fluorescence image information from unstained transmission microscopy ima… ▽ More

    Submitted 21 April, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

    Comments: 12 pages, 13 figures

  14. arXiv:2002.07838  [pdf, other

    cs.CR

    Cyberattack Action-Intent-Framework for Mapping Intrusion Observables

    Authors: Stephen Moskal, Shanchieh Jay Yang

    Abstract: The techniques and tactics used by cyber adversaries are becoming more sophisticated, ironically, as defense getting stronger and the cost of a breach continuing to rise. Understanding the thought processes and behaviors of adversaries is extremely challenging as high profile or even amateur attackers have no incentive to share the trades associated with their illegal activities. One opportunity t… ▽ More

    Submitted 21 February, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

  15. arXiv:1908.01219  [pdf, other

    cs.LG cs.CR stat.ML

    On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

    Authors: Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang

    Abstract: Recreating cyber-attack alert data with a high level of fidelity is challenging due to the intricate interaction between features, non-homogeneity of alerts, and potential for rare yet critical samples. Generative Adversarial Networks (GANs) have been shown to effectively learn complex data distributions with the intent of creating increasingly realistic data. This paper presents the application o… ▽ More

    Submitted 3 August, 2019; originally announced August 2019.

  16. arXiv:1809.01562  [pdf, other

    cs.CR

    Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences

    Authors: Haitao Du, Shanchieh Jay Yang

    Abstract: A key element in defending computer networks is to recognize the types of cyber attacks based on the observed malicious activities. Obfuscation onto what could have been observed of an attack sequence may lead to mis-interpretation of its effect and intent, leading to ineffective defense or recovery deployments. This work develops probabilistic graphical models to generalize a few obfuscation tech… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  17. arXiv:1804.07646  [pdf

    cs.CR

    Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Authors: Alexander Kott, Ryan Thomas, Martin Drašar, Markus Kont, Alex Poylisher, Benjamin Blakely, Paul Theron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, S Jay Yang, Benoit LeBlanc, Paul Losiewicz, Sylvain Hourlier, Misty Blowers, Hugh Harney, Gregory Wehner, Alessandro Guarino, Jana Komárková, James Rowell

    Abstract: This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October 2017. There is a growing recognition that future cyber defense should involve extensive use of partially autonomous agents that actively patrol the fr… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Report number: ARL-SR-0395

  18. arXiv:1803.09560  [pdf, other

    cs.CR

    Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities

    Authors: Ahmet Okutan, Shanchieh Jay Yang, Katie McConky

    Abstract: If cyber incidents are predicted a reasonable amount of time before they occur, defensive actions to prevent their destructive effects could be planned. Unfortunately, most of the time we do not have enough observables of the malicious activities before they are already under way. Therefore, this work suggests to use unconventional signals extracted from various data sources with different time gr… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.