Skip to main content

Showing 1–3 of 3 results for author: Beaver, J M

.
  1. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  2. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  3. arXiv:1812.02867  [pdf, other

    cs.HC cs.CY

    How do information security workers use host data? A summary of interviews with security analysts

    Authors: Robert A. Bridges, Michael D. Iannacone, John R. Goodall, Justin M. Beaver

    Abstract: Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, access to actual security personnel, their data, and their problems are necessarily limited by security concerns and time constraints. To help bridge t… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: interviews with 13 security analysts about host data, tools, desires