Skip to main content

Showing 1–8 of 8 results for author: Nichols, J A

.
  1. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  2. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  3. Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools

    Authors: Jeffrey A. Nichols, Kevin D. Spakes, Cory L. Watson, Robert A. Bridges

    Abstract: In this case study, we describe the design and assembly of a cyber security testbed at Oak Ridge National Laboratory in Oak Ridge, TN, USA. The range is designed to provide agile reconfigurations to facilitate a wide variety of experiments for evaluations of cyber security tools -- particularly those involving AI/ML. In particular, the testbed provides realistic test environments while permitting… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021

  4. arXiv:2103.03985  [pdf, other

    math.NA

    Coarse reduced model selection for nonlinear state estimation

    Authors: James A. Nichols

    Abstract: State estimation is the task of approximately reconstructing a solution $u$ of a parametric partial differential equation when the parameter vector $y$ is unknown and the only information is $m$ linear measurements of $u$. In [Cohen et. al., 2021] the authors proposed a method to use a family of linear reduced spaces as a generalised nonlinear reduced model for state estimation. A computable surro… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures. Cconference report

    MSC Class: 65M32; 65M15; 68U20; 65D99

  5. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  6. arXiv:2004.12023  [pdf, other

    physics.chem-ph physics.comp-ph

    NWChem: Past, Present, and Future

    Authors: E. Aprà, E. J. Bylaska, W. A. de Jong, N. Govind, K. Kowalski, T. P. Straatsma, M. Valiev, H. J. J. van Dam, Y. Alexeev, J. Anchell, V. Anisimov, F. W. Aquino, R. Atta-Fynn, J. Autschbach, N. P. Bauman, J. C. Becca, D. E. Bernholdt, K. Bhaskaran-Nair, S. Bogatko, P. Borowski, J. Boschen, J. Brabec, A. Bruner, E. Cauët, Y. Chen , et al. (89 additional authors not shown)

    Abstract: Specialized computational chemistry packages have permanently reshaped the landscape of chemical and materials science by providing tools to support and guide experimental efforts and for the prediction of atomistic and electronic properties. In this regard, electronic structure packages have played a special role by using first-principledriven methodologies to model complex chemical and materials… ▽ More

    Submitted 26 May, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

    Comments: This article appeared in volume 152, issue 18, page 184102 of the Journal of Chemical Physics. It can be found at https://doi.org/10.1063/5.0004997

    Journal ref: J. Chem. Phys., 152, 184102 (2020)

  7. Subdiffusive discrete time random walks via Monte Carlo and subordination

    Authors: J. A. Nichols, B. I. Henry, C. N. Angstmann

    Abstract: A class of discrete time random walks has recently been introduced to provide a stochastic process based numerical scheme for solving fractional order partial differential equations, including the fractional subdiffusion equation. Here we develop a Monte Carlo method for simulating discrete time random walks with Sibuya power law waiting times, providing another approximate solution of the fractio… ▽ More

    Submitted 16 November, 2017; originally announced November 2017.

    MSC Class: 65C05

  8. arXiv:1705.01977  [pdf, other

    cs.CR

    Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study

    Authors: Jarilyn M. Hernández Jiménez, Jeffrey A. Nichols, Katerina Goseva-Popstojanova, Stacy Prowell, Robert A. Bridges

    Abstract: Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a general-purpose computer. The results of our experi… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.