Skip to main content

Showing 1–9 of 9 results for author: Boboila, S

.
  1. arXiv:2407.08159  [pdf, other

    cs.CR cs.LG

    Model-agnostic clean-label backdoor mitigation in cybersecurity environments

    Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Alina Oprea

    Abstract: The training phase of machine learning models is a delicate step, especially in cybersecurity contexts. Recent research has surfaced a series of insidious training-time attacks that inject backdoors in models designed for security classification tasks without altering the training labels. With this work, we propose new techniques that leverage insights in cybersecurity threat models to effectively… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 14 pages, 8 figures

  2. arXiv:2306.01655  [pdf, other

    cs.CR cs.LG

    Poisoning Network Flow Classifiers

    Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer

    Abstract: As machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary's capabilities are constra… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: 14 pages, 8 figures

  3. arXiv:2301.09732  [pdf, other

    cs.LG cs.CR

    Backdoor Attacks in Peer-to-Peer Federated Learning

    Authors: Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets. While federated learning (FL) mitigates to some extent these privacy risks, it relies on a trusted aggregation server for training a shared global model. Recently, new distributed learning architectures based on Peer-to-Peer Federated Learning (P2PFL) offer advanta… ▽ More

    Submitted 25 June, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  4. arXiv:2208.03276  [pdf, other

    cs.CR math.DS stat.AP

    Modeling Self-Propagating Malware with Epidemiological Models

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has recently resulted in large financial losses and high social impact, with well-known campaigns such as WannaCry and Colonial Pipeline being able to propagate rapidly on the Internet and cause service disruptions. To date, the propagation behavior of SPM is still not well understood, resulting in the difficulty of defending against these cyber threats. To address t… ▽ More

    Submitted 3 August, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

  5. arXiv:2206.13594  [pdf, other

    cs.CR math.DS math.SP stat.AP

    Cyber Network Resilience against Self-Propagating Malware Attacks

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of develo** cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that a… ▽ More

    Submitted 8 October, 2022; v1 submitted 27 June, 2022; originally announced June 2022.

    Comments: 20 pages

  6. arXiv:2205.11459  [pdf, other

    cs.CR cs.LG

    CELEST: Federated Learning for Globally Coordinated Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson

    Abstract: The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat detection, a federated machine learning framework for global threat detection over HTTP, which is one of the most commonly used protocols for malware… ▽ More

    Submitted 16 March, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  7. arXiv:2112.13798  [pdf, other

    cs.CR

    PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

    Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan

    Abstract: Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques, and can evade existing detection mechanisms. We propose PORTFILER (PORT-Level Network Traffic ProFILER), a new machine learning system applied to ne… ▽ More

    Submitted 24 May, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021

  8. arXiv:2104.11636  [pdf, other

    cs.CR

    Collaborative Information Sharing for ML-Based Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson

    Abstract: Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat sharing platforms cannot easily adapt to emerging attack patterns. At the same time, enterprises started to adopt machine learning-based threat detection… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 5 figures. To be published in AI4CS-SDM2021

  9. arXiv:1907.04846  [pdf, other

    cs.CR cs.LG stat.ML

    On Designing Machine Learning Models for Malicious Network Traffic Classification

    Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad

    Abstract: Machine learning (ML) started to become widely deployed in cyber security settings for shortening the detection cycle of cyber attacks. To date, most ML-based systems are either proprietary or make specific choices of feature representations and machine learning models. The success of these techniques is difficult to assess as public benchmark datasets are currently unavailable. In this paper, we… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.