Skip to main content

Showing 1–3 of 3 results for author: Nottingham, A

.
  1. arXiv:2112.13798  [pdf, other

    cs.CR

    PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

    Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan

    Abstract: Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques, and can evade existing detection mechanisms. We propose PORTFILER (PORT-Level Network Traffic ProFILER), a new machine learning system applied to ne… ▽ More

    Submitted 24 May, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021

  2. arXiv:2104.11636  [pdf, other

    cs.CR

    Collaborative Information Sharing for ML-Based Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson

    Abstract: Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat sharing platforms cannot easily adapt to emerging attack patterns. At the same time, enterprises started to adopt machine learning-based threat detection… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 5 figures. To be published in AI4CS-SDM2021

  3. arXiv:2104.10034  [pdf, other

    cs.CR

    On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

    Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea

    Abstract: Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be meaningfully trained, tested, and evaluated. Synthetically produced data containing fabricated or merged network traffic is of limited value as it is… ▽ More

    Submitted 27 May, 2022; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 4+2 pages, 3 figures, 1 table, for AI4CS-SDM21