Skip to main content

Showing 1–24 of 24 results for author: Rastogi, N

.
  1. arXiv:2407.02528  [pdf, other

    cs.CR cs.AI cs.CL

    Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models

    Authors: Romy Fieblinger, Md Tanvirul Alam, Nidhi Rastogi

    Abstract: Cyber threats are constantly evolving. Extracting actionable insights from unstructured Cyber Threat Intelligence (CTI) data is essential to guide cybersecurity decisions. Increasingly, organizations like Microsoft, Trend Micro, and CrowdStrike are using generative AI to facilitate CTI extraction. This paper addresses the challenge of automating the extraction of actionable CTI using advancements… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: 6th Workshop on Attackers and Cyber-Crime Operations, 12 pages, 1 figure, 9 tables

  2. arXiv:2406.07599  [pdf, other

    cs.CR cs.AI

    CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Le Nguyen, Nidhi Rastogi

    Abstract: Cyber threat intelligence (CTI) is crucial in today's cybersecurity landscape, providing essential insights to understand and mitigate the ever-evolving cyber threats. The recent rise of Large Language Models (LLMs) have shown potential in this domain, but concerns about their reliability, accuracy, and hallucinations persist. While existing benchmarks provide general evaluations of LLMs, there ar… ▽ More

    Submitted 24 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2405.20441  [pdf, other

    cs.CR cs.AI cs.HC

    SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Nidhi Rastogi

    Abstract: Large Language Models (LLMs) have demonstrated potential in cybersecurity applications but have also caused lower confidence due to problems like hallucinations and a lack of truthfulness. Existing benchmarks provide general evaluations but do not sufficiently address the practical and applied aspects of LLM performance in cybersecurity-specific tasks. To address this gap, we introduce the SECURE… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2404.10789  [pdf, other

    cs.CR cs.AI cs.LG

    PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis

    Authors: Dipkamal Bhusal, Md Tanvirul Alam, Monish K. Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

    Abstract: Deep neural networks for classification are vulnerable to adversarial attacks, where small perturbations to input samples lead to incorrect predictions. This susceptibility, combined with the black-box nature of such networks, limits their adoption in critical applications like autonomous driving. Feature-attribution-based explanation methods provide relevance of input features for model predictio… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9th IEEE European Symposium on Security and Privacy

  5. arXiv:2401.12790  [pdf, other

    cs.LG

    MORPH: Towards Automated Concept Drift Adaptation for Malware Detection

    Authors: Md Tanvirul Alam, Romy Fieblinger, Ashim Mahara, Nidhi Rastogi

    Abstract: Concept drift is a significant challenge for malware detection, as the performance of trained machine learning models degrades over time, rendering them impractical. While prior research in malware concept drift adaptation has primarily focused on active learning, which involves selecting representative samples to update the model, self-training has emerged as a promising approach to mitigate conc… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  6. arXiv:2311.01247  [pdf, other

    cs.CR

    Emergent (In)Security of Multi-Cloud Environments

    Authors: Morgan Reece, Theodore Lander Jr., Sudip Mittal, Nidhi Rastogi, Josiah Dykstra, Andy Sampson

    Abstract: As organizations increasingly use cloud services to host their IT infrastructure, there is a need to share data among these cloud hosted services and systems. A majority of IT organizations have workloads spread across different cloud service providers, growing their multi-cloud environments. When an organization grows their multi-cloud environment, the threat vectors and vulnerabilities for their… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Journal ref: 39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023)

  7. arXiv:2306.01862  [pdf, other

    cs.CR

    Systemic Risk and Vulnerability Analysis of Multi-cloud Environments

    Authors: Morgan Reece, Theodore Edward Lander Jr., Matthew Stoffolano, Andy Sampson, Josiah Dykstra, Sudip Mittal, Nidhi Rastogi

    Abstract: With the increasing use of multi-cloud environments, security professionals face challenges in configuration, management, and integration due to uneven security capabilities and features among providers. As a result, a fragmented approach toward security has been observed, leading to new attack vectors and potential vulnerabilities. Other research has focused on single-cloud platforms or specific… ▽ More

    Submitted 7 July, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 27 pages, 9 figures

  8. arXiv:2211.01753  [pdf, other

    cs.CR cs.LG

    Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional CTI has primarily focused on tracking known threat indicators such as IP addresses and domain names, which may not provide long-term value in defending against evolving attacks. To address this challenge, we propose to us… ▽ More

    Submitted 11 July, 2023; v1 submitted 1 November, 2022; originally announced November 2022.

  9. SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability

    Authors: Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi

    Abstract: Interpretability, trustworthiness, and usability are key considerations in high-stake security applications, especially when utilizing deep learning models. While these models are known for their high accuracy, they behave as black boxes in which identifying important features and factors that led to a classification or a prediction is difficult. This can lead to uncertainty and distrust, especial… ▽ More

    Submitted 12 June, 2023; v1 submitted 31 October, 2022; originally announced October 2022.

    Comments: 12 pages, 4 figures

  10. arXiv:2209.05440  [pdf, other

    cs.CY

    Bias Impact Analysis of AI in Consumer Mobile Health Technologies: Legal, Technical, and Policy

    Authors: Kristine Gloria, Nidhi Rastogi, Stevie DeGroff

    Abstract: Today's large-scale algorithmic and automated deployment of decision-making systems threatens to exclude marginalized communities. Thus, the emergent danger comes from the effectiveness and the propensity of such systems to replicate, reinforce, or amplify harmful existing discriminatory acts. Algorithmic bias exposes a deeply entrenched encoding of a range of unwanted biases that can have profoun… ▽ More

    Submitted 28 August, 2022; originally announced September 2022.

  11. arXiv:2204.05754  [pdf, other

    cs.CR cs.LG

    CyNER: A Python Library for Cybersecurity Named Entity Recognition

    Authors: Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

    Abstract: Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet. We present CyNER, an open-source python library for cybersecurity named entity recognition (NER). CyNER combines transformer-based models for extracting cybersecurity-related entities, heuristics for extracting different indicators of compromise, and publicly avai… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  12. arXiv:2203.02121  [pdf, other

    cs.CR cs.LG

    Adversarial Patterns: Building Robust Android Malware Classifiers

    Authors: Dipkamal Bhusal, Nidhi Rastogi

    Abstract: Machine learning models are increasingly being adopted across various fields, such as medicine, business, autonomous vehicles, and cybersecurity, to analyze vast amounts of data, detect patterns, and make predictions or recommendations. In the field of cybersecurity, these models have made significant improvements in malware detection. However, despite their ability to understand complex patterns… ▽ More

    Submitted 12 April, 2024; v1 submitted 3 March, 2022; originally announced March 2022.

    Comments: survey

  13. arXiv:2203.00150  [pdf, other

    cs.CR cs.AI

    Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles

    Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt

    Abstract: Connected autonomous vehicles (CAVs) are anticipated to have built-in AI systems for defending against cyberattacks. Machine learning (ML) models form the basis of many such AI systems. These models are notorious for acting like black boxes, transforming inputs into solutions with great accuracy, but no explanations support their decisions. Explanations are needed to communicate model performance,… ▽ More

    Submitted 28 February, 2022; originally announced March 2022.

    Comments: Accepted at the AAAI 2022 Workshop on Explainable Agency in Artificial Intelligence Workshop, Virtual. 8 pages, 3 Figures, 4 tables

    MSC Class: 68M25; 60B11; 68T05

  14. arXiv:2109.01544  [pdf, other

    cs.CR cs.AI

    Ontology-driven Knowledge Graph for Android Malware

    Authors: Ryan Christian, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi

    Abstract: We present MalONT2.0 -- an ontology for malware threat intelligence \cite{rastogi2020malont}. New classes (attack patterns, infrastructural resources to enable attacks, malware analysis to incorporate static analysis, and dynamic analysis of binaries) and relations have been added following a broadened scope of core competency questions. MalONT2.0 allows researchers to extensively capture all requ… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

    Comments: 3 pages, 5 figures

  15. arXiv:2102.05600  [pdf, other

    cs.CR cs.AI

    DANTE: Predicting Insider Threat using LSTM on system logs

    Authors: Nidhi Rastogi, Qicheng Ma

    Abstract: Insider threat is one of the most pernicious threat vectors to information and communication technologies (ICT)across the world due to the elevated level of trust and access that an insider is afforded. This type of threat can stem from both malicious users with a motive as well as negligent users who inadvertently reveal details about trade secrets, company information, or even access information… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: 6 pages

  16. Malware Knowledge Graph Generation

    Authors: Sharmishtha Dutta, Nidhi Rastogi, Destin Yee, Chuqiao Gu, Qicheng Ma

    Abstract: Cyber threat and attack intelligence information are available in non-standard format from heterogeneous sources. Comprehending them and utilizing them for threat intelligence extraction requires engaging security experts. Knowledge graphs enable converting this unstructured information from heterogeneous sources into a structured representation of data and factual knowledge for several downstream… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: 5 pages

  17. arXiv:2102.05571  [pdf, other

    cs.CR cs.AI cs.IR cs.LG

    TINKER: A framework for Open source Cyberthreat Intelligence

    Authors: Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal

    Abstract: Threat intelligence on malware attacks and campaigns is increasingly being shared with other security experts for a cost or for free. Other security analysts use this intelligence to inform them of indicators of compromise, attack techniques, and preventative actions. Security analysts prepare threat analysis reports after investigating an attack, an emerging cyber threat, or a recently discovered… ▽ More

    Submitted 19 January, 2023; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 9 pages

  18. arXiv:2011.14402  [pdf

    physics.ao-ph stat.AP

    Chemical speciation and source apportionment of ambient PM2.5 in New Delhi before, during, and after the Diwali fireworks

    Authors: Chirag Manchanda, Mayank Kumar, Vikram Singh, Naba Hazarika, Mohd Faisal, Vipul Lalchandani, Ashutosh Shukla, Jay Dave, Neeraj Rastogi, Sachchida Nand Tripathi

    Abstract: Diwali is among the most important Indian festivals, and elaborate firework displays mark the evening's festivities. This study assesses the impact of Diwali on the concentration, composition, and sources of ambient PM2.5. We observed the total PM2.5 concentrations to rise to 16 times the pre-firework levels, while each of the elemental, organic, and black carbon fractions of ambient PM2.5 increas… ▽ More

    Submitted 21 April, 2022; v1 submitted 29 November, 2020; originally announced November 2020.

    Comments: The manuscript is accepted for publication in Atmospheric Pollution Research. Present Status: Accepted

  19. MALOnt: An Ontology for Malware Threat Intelligence

    Authors: Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal

    Abstract: Malware threat intelligence uncovers deep information about malware, threat actors, and their tactics, Indicators of Compromise(IoC), and vulnerabilities in different platforms from scattered threat sources. This collective information can guide decision making in cyber defense applications utilized by security operation centers(SoCs). In this paper, we introduce an open-source malware ontology -… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  20. arXiv:2004.00071  [pdf, ps, other

    cs.AI cs.IR

    Personal Health Knowledge Graphs for Patients

    Authors: Nidhi Rastogi, Mohammed J. Zaki

    Abstract: Existing patient data analytics platforms fail to incorporate information that has context, is personal, and topical to patients. For a recommendation system to give a suitable response to a query or to derive meaningful insights from patient data, it should consider personal information about the patient's health history, including but not limited to their preferences, locations, and life choices… ▽ More

    Submitted 7 May, 2020; v1 submitted 31 March, 2020; originally announced April 2020.

    Comments: 3 pages, workshop paper

    ACM Class: I.2.4

  21. arXiv:1904.12138  [pdf

    cs.CR cs.LG cs.SI

    Exploring Information Centrality for Intrusion Detection in Large Networks

    Authors: Nidhi Rastogi

    Abstract: Modern networked systems are constantly under threat from systemic attacks. There has been a massive upsurge in the number of devices connected to a network as well as the associated traffic volume. This has intensified the need to better understand all possible attack vectors during system design and implementation. Further, it has increased the need to mine large data sets, analyzing which has b… ▽ More

    Submitted 12 June, 2020; v1 submitted 27 April, 2019; originally announced April 2019.

    Comments: 14 pages, 4 figures, 18th Annual Security Conference

    ACM Class: D.4.6; E.3

    Journal ref: In Proceedings of the Annual Information Institute Conference, March 26-28, 2018. Las Vegas, USA. ISBN: 978-1-935160-19-9

  22. arXiv:1701.06828  [pdf

    cs.DC cs.CY cs.NI

    Security and Privacy of performing Data Analytics in the cloud - A three-way handshake of Technology, Policy, and Management

    Authors: Nidhi Rastogi, Marie Joan Kristine Gloria, James Hendler

    Abstract: Cloud platform came into existence primarily to accelerate IT delivery and to promote innovation. To this point, it has performed largely well to the expectations of technologists, businesses and customers. The service aspect of this technology has paved the road for a faster set up of infrastructure and related goals for both startups and established organizations. This has further led to quicker… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

    Comments: 28 pages, 3 figures, Journal of Information Privacy

    ACM Class: C.2.0; D.4.6; K.4.1; C.2.4

    Journal ref: Journal of Information Policy 5 (2015): 129-154

  23. arXiv:1701.06823  [pdf, other

    cs.CR cs.NI

    Graph Analytics for anomaly detection in homogeneous wireless networks - A Simulation Approach

    Authors: Nidhi Rastogi, James Hendler

    Abstract: In the Internet of Things (IoT) devices are exposed to various kinds of attacks when connected to the Internet. An attack detection mechanism that understands the limitations of these severely resource-constrained devices is necessary. This is important since current approaches are either customized for wireless networks or for the conventional Internet with heavy data transmission. Also, the dete… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

    Comments: 5 pages, 4 figures, ICCWS

    ACM Class: C.2.0; D.4.6

  24. arXiv:1701.06817  [pdf

    cs.CR cs.NI cs.SI

    WhatsApp security and role of metadata in preserving privacy

    Authors: Nidhi Rastogi, James Hendler

    Abstract: WhatsApp messenger is arguably the most popular mobile app available on all smart-phones. Over one billion people worldwide for free messaging, calling, and media sharing use it. In April 2016, WhatsApp switched to a default end-to-end encrypted service. This means that all messages (SMS), phone calls, videos, audios, and any other form of information exchanged cannot be read by any unauthorized e… ▽ More

    Submitted 24 January, 2017; originally announced January 2017.

    Comments: 8 pages, 2 figures

    ACM Class: C.2.0; D.4.6