Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ongun, Talha"'
The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat
Externí odkaz:
http://arxiv.org/abs/2205.11459
Autor:
Ongun, Talha, Spohngellert, Oliver, Miller, Benjamin, Boboila, Simona, Oprea, Alina, Eliassi-Rad, Tina, Hiser, Jason, Nottingham, Alastair, Davidson, Jack, Veeraraghavan, Malathi
Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques
Externí odkaz:
http://arxiv.org/abs/2112.13798
Autor:
Ongun, Talha, Stokes, Jack W., Or, Jonathan Bar, Tian, Ke, Tajaddodianfar, Farid, Neil, Joshua, Seifert, Christian, Oprea, Alina, Platt, John C.
In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly common evasive method is to hide the malicious activit
Externí odkaz:
http://arxiv.org/abs/2111.15039
Autor:
Ongun, Talha, Boboila, Simona, Oprea, Alina, Eliassi-Rad, Tina, Nottingham, Alastair, Hiser, Jason, Davidson, Jack
Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat shar
Externí odkaz:
http://arxiv.org/abs/2104.11636
Autor:
Ongun, Talha, Spohngellert, Oliver, Oprea, Alina, Nita-Rotaru, Cristina, Christodorescu, Mihai, Salajegheh, Negin
Home-based Internet of Things (IoT) devices have gained in popularity and many households have become 'smart' by using devices such as smart sensors, locks, and voice-based assistants. Traditional authentication methods such as passwords, biometrics
Externí odkaz:
http://arxiv.org/abs/1908.00592
Machine learning (ML) started to become widely deployed in cyber security settings for shortening the detection cycle of cyber attacks. To date, most ML-based systems are either proprietary or make specific choices of feature representations and mach
Externí odkaz:
http://arxiv.org/abs/1907.04846