Skip to main content

Showing 1–13 of 13 results for author: Iannacone, M D

.
  1. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  2. arXiv:2306.15588  [pdf

    cs.CR eess.SY

    Develo** and Deploying Security Applications for In-Vehicle Networks

    Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone

    Abstract: Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been e… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: 10 pages, PATRAM 22

  3. arXiv:2201.02665  [pdf, other

    cs.CR cs.LG stat.AP

    Detecting CAN Masquerade Attacks with Signal Clustering Similarity

    Authors: Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

    Abstract: Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of different levels of sophistication. Fabrication attacks are the easiest to administer -- an adversary simply sends (extra) frames on a CAN -- but also the easiest to detect because they disrupt frame frequency. To overcome time-based detection methods, adversaries must administer masquerade attacks by sending frames in l… ▽ More

    Submitted 11 March, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 8 pages, 5 figures, 3 tables

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022

  4. Time-Based CAN Intrusion Detection Benchmark

    Authors: Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

    Abstract: Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message injection attacks. These injections change the overall timing characteristics of messages on the bus, and thus, to detect these malicious messages, t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021

  5. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  6. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  7. arXiv:2006.05993  [pdf, other

    cs.OH eess.SP

    CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data

    Authors: Miki E. Verma, Robert A. Bridges, Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone

    Abstract: CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their map**s of CAN data to vehicle signals, and these definitions vary according to make, model, and year. Without these map**s, the wealth of real-time vehicle information hidden in the CAN packets is uninterpretable, impeding vehicle-re… ▽ More

    Submitted 22 June, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

  8. arXiv:1902.00053  [pdf, other

    cs.CR

    Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach

    Authors: Michael D. Iannacone, Robert A. Bridges

    Abstract: Metrics and frameworks to quantifiably assess security measures have arisen from needs of three distinct research communities - statistical measures from the intrusion detection and prevention literature, evaluation of cyber exercises, e.g.,red-team and capture-the-flag competitions, and economic analyses addressing cost-versus-security tradeoffs. In this paper we provide two primary contributions… ▽ More

    Submitted 24 October, 2019; v1 submitted 31 January, 2019; originally announced February 2019.

  9. arXiv:1812.02867  [pdf, other

    cs.HC cs.CY

    How do information security workers use host data? A summary of interviews with security analysts

    Authors: Robert A. Bridges, Michael D. Iannacone, John R. Goodall, Justin M. Beaver

    Abstract: Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, access to actual security personnel, their data, and their problems are necessarily limited by security concerns and time constraints. To help bridge t… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: interviews with 13 security analysts about host data, tools, desires

  10. arXiv:1805.06070  [pdf, ps, other

    cs.CR

    A Survey of Intrusion Detection Systems Leveraging Host Data

    Authors: Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian, Chen, Robert A. Bridges

    Abstract: This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is organized by the input data source, presenting targeted sub-surveys of HIDS research leveraging system logs, audit data, Windows Registry, file systems, and program analysis. While system calls are generally included in… ▽ More

    Submitted 16 May, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

  11. arXiv:1602.01130  [pdf, other

    cs.CR stat.ML

    GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

    Authors: Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall

    Abstract: This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets -- small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of tr… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: 4 pages submitted to Cyber & Information Security Research Conference 2016, ACM

  12. arXiv:1308.4941  [pdf, other

    cs.IR cs.CL

    Automatic Labeling for Entity Extraction in Cyber Security

    Authors: Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall

    Abstract: Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often no… ▽ More

    Submitted 9 June, 2014; v1 submitted 22 August, 2013; originally announced August 2013.

    Comments: 10 pages

  13. arXiv:1308.4648  [pdf, other

    cs.IR cs.CL

    PACE: Pattern Accurate Computationally Efficient Bootstrap** for Timely Discovery of Cyber-Security Concepts

    Authors: Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall

    Abstract: Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources months before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant en… ▽ More

    Submitted 11 October, 2013; v1 submitted 21 August, 2013; originally announced August 2013.

    Comments: 6 pages, 3 figures, ieeeTran conference. International Conference on Machine Learning and Applications 2013

    MSC Class: IEEE