Skip to main content

Showing 1–4 of 4 results for author: Ingram, J B

.
  1. arXiv:2005.09787  [pdf, other

    cs.LG stat.ML

    Self-Updating Models with Error Remediation

    Authors: Justin E. Doak, Michael R. Smith, Joey B. Ingram

    Abstract: Many environments currently employ machine learning models for data processing and analytics that were built using a limited number of training data points. Once deployed, the models are exposed to significant amounts of previously-unseen data, not all of which is representative of the original, limited training data. However, updating these deployed models can be difficult due to logistical, band… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 17 pages, 13 figures, published in the proceedings of the Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II conference in the SPIE Defense + Commercial Sensing, 2020 symposium

    Report number: SAND No: SAND2020-5113 C ACM Class: I.2.6

    Journal ref: Proc. SPIE 11413, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II, 114131W (18 May 2020)

  2. arXiv:2005.01800  [pdf, other

    cs.CR cs.LG stat.ML

    Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

    Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer

    Abstract: Despite the potential of Machine learning (ML) to learn the behavior of malware, detect novel malware samples, and significantly improve information security (InfoSec) we see few, if any, high-impact ML techniques in deployed systems, notwithstanding multiple reported successes in open literature. We hypothesize that the failure of ML in making high-impacts in InfoSec are rooted in a disconnect be… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 2 Figures, 6 tables

  3. arXiv:1712.07671  [pdf, other

    cs.CR

    Tracking Cyber Adversaries with Adaptive Indicators of Compromise

    Authors: Justin E. Doak, Joe B. Ingram, Sam A. Mulder, John H. Naegle, Jonathan A. Cox, James B. Aimone, Kevin R. Dixon, Conrad D. James, David R. Follett

    Abstract: A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary's new TTPs, the adversary w… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

    Comments: This was presented at the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

    Report number: SAND2017-12402 C

    Journal ref: This will be in the proceedings of the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

  4. arXiv:1711.03947  [pdf, other

    cs.CR stat.ML

    Dynamic Analysis of Executables to Detect and Characterize Malware

    Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James

    Abstract: It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating attempts at obfuscation as the behavior is monitored rather than the bytes of an executable. We examine several machine learning techniques for de… ▽ More

    Submitted 28 September, 2018; v1 submitted 10 November, 2017; originally announced November 2017.

    Comments: 9 pages, 6 Tables, 4 Figures

    Report number: SAND2018-11011 C