Skip to main content

Showing 1–8 of 8 results for author: Bhusal, D

.
  1. arXiv:2406.07599  [pdf, other

    cs.CR cs.AI

    CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Le Nguyen, Nidhi Rastogi

    Abstract: Cyber threat intelligence (CTI) is crucial in today's cybersecurity landscape, providing essential insights to understand and mitigate the ever-evolving cyber threats. The recent rise of Large Language Models (LLMs) have shown potential in this domain, but concerns about their reliability, accuracy, and hallucinations persist. While existing benchmarks provide general evaluations of LLMs, there ar… ▽ More

    Submitted 24 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2405.20441  [pdf, other

    cs.CR cs.AI cs.HC

    SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Nidhi Rastogi

    Abstract: Large Language Models (LLMs) have demonstrated potential in cybersecurity applications but have also caused lower confidence due to problems like hallucinations and a lack of truthfulness. Existing benchmarks provide general evaluations but do not sufficiently address the practical and applied aspects of LLM performance in cybersecurity-specific tasks. To address this gap, we introduce the SECURE… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2404.10789  [pdf, other

    cs.CR cs.AI cs.LG

    PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Monish K. Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

    Abstract: Deep neural networks for classification are vulnerable to adversarial attacks, where small perturbations to input samples lead to incorrect predictions. This susceptibility, combined with the black-box nature of such networks, limits their adoption in critical applications like autonomous driving. Feature-attribution-based explanation methods provide relevance of input features for model predictio… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9th IEEE European Symposium on Security and Privacy

  4. arXiv:2211.01753  [pdf, other

    cs.CR cs.LG

    Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional CTI has primarily focused on tracking known threat indicators such as IP addresses and domain names, which may not provide long-term value in defending against evolving attacks. To address this challenge, we propose to us… ▽ More

    Submitted 11 July, 2023; v1 submitted 1 November, 2022; originally announced November 2022.

  5. SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability

    Authors: Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

    Abstract: Interpretability, trustworthiness, and usability are key considerations in high-stake security applications, especially when utilizing deep learning models. While these models are known for their high accuracy, they behave as black boxes in which identifying important features and factors that led to a classification or a prediction is difficult. This can lead to uncertainty and distrust, especial… ▽ More

    Submitted 12 June, 2023; v1 submitted 31 October, 2022; originally announced October 2022.

    Comments: 12 pages, 4 figures

  6. arXiv:2204.05754  [pdf, other

    cs.CR cs.LG

    CyNER: A Python Library for Cybersecurity Named Entity Recognition

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet. We present CyNER, an open-source python library for cybersecurity named entity recognition (NER). CyNER combines transformer-based models for extracting cybersecurity-related entities, heuristics for extracting different indicators of compromise, and publicly avai… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  7. arXiv:2203.02121  [pdf, other

    cs.CR cs.LG

    Adversarial Patterns: Building Robust Android Malware Classifiers

    Authors: Dipkamal Bhusal, Nidhi Rastogi

    Abstract: Machine learning models are increasingly being adopted across various fields, such as medicine, business, autonomous vehicles, and cybersecurity, to analyze vast amounts of data, detect patterns, and make predictions or recommendations. In the field of cybersecurity, these models have made significant improvements in malware detection. However, despite their ability to understand complex patterns… ▽ More

    Submitted 12 April, 2024; v1 submitted 3 March, 2022; originally announced March 2022.

    Comments: survey

  8. arXiv:2202.03583  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Multi-Label Classification of Thoracic Diseases using Dense Convolutional Network on Chest Radiographs

    Authors: Dipkamal Bhusal, Sanjeeb Prasad Panday

    Abstract: Traditional methods of identifying pathologies in X-ray images rely heavily on skilled human interpretation and are often time-consuming. The advent of deep learning techniques has enabled the development of automated disease diagnosis systems. Still, the performance of such systems is opaque to end-users and limited to detecting a single pathology. In this paper, we propose a multi-label disease… ▽ More

    Submitted 29 March, 2024; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: 13 pages