-
Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features
Authors:
Jean Marie Tshimula,
D'Jeff K. Nkashama,
Jean Tshibangu Muabila,
René Manassé Galekwa,
Hugues Kanda,
Maximilien V. Dialufuma,
Mbuyi Mukendi Didier,
Kalala Kalonji,
Serge Mundele,
Patience Kinshie Lenye,
Tighana Wenge Basele,
Aristarque Ilunga,
Christian N. Mayemba,
Nathanaël M. Kasoro,
Selain K. Kasereka,
Hardy Mikese,
Pierre-Martin Tardif,
Marc Frappier,
Froduald Kabanza,
Belkacem Chikhaoui,
Shengrui Wang,
Ali Mulenda Sumbu,
Xavier Ndona,
Raoul Kienge-Kienge Intudi
Abstract:
The increasing sophistication of cyber threats necessitates innovative approaches to cybersecurity. In this paper, we explore the potential of psychological profiling techniques, particularly focusing on the utilization of Large Language Models (LLMs) and psycholinguistic features. We investigate the intersection of psychology and cybersecurity, discussing how LLMs can be employed to analyze textu…
▽ More
The increasing sophistication of cyber threats necessitates innovative approaches to cybersecurity. In this paper, we explore the potential of psychological profiling techniques, particularly focusing on the utilization of Large Language Models (LLMs) and psycholinguistic features. We investigate the intersection of psychology and cybersecurity, discussing how LLMs can be employed to analyze textual data for identifying psychological traits of threat actors. We explore the incorporation of psycholinguistic features, such as linguistic patterns and emotional cues, into cybersecurity frameworks. Our research underscores the importance of integrating psychological perspectives into cybersecurity practices to bolster defense mechanisms against evolving threats.
△ Less
Submitted 28 June, 2024; v1 submitted 26 June, 2024;
originally announced June 2024.
-
Characterizing Financial Market Coverage using Artificial Intelligence
Authors:
Jean Marie Tshimula,
D'Jeff K. Nkashama,
Patrick Owusu,
Marc Frappier,
Pierre-Martin Tardif,
Froduald Kabanza,
Armelle Brun,
Jean-Marc Patenaude,
Shengrui Wang,
Belkacem Chikhaoui
Abstract:
This paper scrutinizes a database of over 4900 YouTube videos to characterize financial market coverage. Financial market coverage generates a large number of videos. Therefore, watching these videos to derive actionable insights could be challenging and complex. In this paper, we leverage Whisper, a speech-to-text model from OpenAI, to generate a text corpus of market coverage videos from Bloombe…
▽ More
This paper scrutinizes a database of over 4900 YouTube videos to characterize financial market coverage. Financial market coverage generates a large number of videos. Therefore, watching these videos to derive actionable insights could be challenging and complex. In this paper, we leverage Whisper, a speech-to-text model from OpenAI, to generate a text corpus of market coverage videos from Bloomberg and Yahoo Finance. We employ natural language processing to extract insights regarding language use from the market coverage. Moreover, we examine the prominent presence of trending topics and their evolution over time, and the impacts that some individuals and organizations have on the financial market. Our characterization highlights the dynamics of the financial market coverage and provides valuable insights reflecting broad discussions regarding recent financial events and the world economy.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
Authors:
D'Jeff Kanda Nkashama,
Arian Soltani,
Jean-Charles Verdier,
Marc Frappier,
Pierre-Martin Tardif,
Froduald Kabanza
Abstract:
Recently, advances in deep learning have been observed in various fields, including computer vision, natural language processing, and cybersecurity. Machine learning (ML) has demonstrated its ability as a potential tool for anomaly detection-based intrusion detection systems to build secure computer networks. Increasingly, ML approaches are widely adopted than heuristic approaches for cybersecurit…
▽ More
Recently, advances in deep learning have been observed in various fields, including computer vision, natural language processing, and cybersecurity. Machine learning (ML) has demonstrated its ability as a potential tool for anomaly detection-based intrusion detection systems to build secure computer networks. Increasingly, ML approaches are widely adopted than heuristic approaches for cybersecurity because they learn directly from data. Data is critical for the development of ML systems, and becomes potential targets for attackers. Basically, data poisoning or contamination is one of the most common techniques used to fool ML models through data. This paper evaluates the robustness of six recent deep learning algorithms for intrusion detection on contaminated data. Our experiments suggest that the state-of-the-art algorithms used in this study are sensitive to data contamination and reveal the importance of self-defense against data perturbation when develo** novel models, especially for intrusion detection systems.
△ Less
Submitted 30 October, 2023; v1 submitted 24 June, 2022;
originally announced July 2022.
-
A Revealing Large-Scale Evaluation of Unsupervised Anomaly Detection Algorithms
Authors:
Maxime Alvarez,
Jean-Charles Verdier,
D'Jeff K. Nkashama,
Marc Frappier,
Pierre-Martin Tardif,
Froduald Kabanza
Abstract:
Anomaly detection has many applications ranging from bank-fraud detection and cyber-threat detection to equipment maintenance and health monitoring. However, choosing a suitable algorithm for a given application remains a challenging design decision, often informed by the literature on anomaly detection algorithms. We extensively reviewed twelve of the most popular unsupervised anomaly detection m…
▽ More
Anomaly detection has many applications ranging from bank-fraud detection and cyber-threat detection to equipment maintenance and health monitoring. However, choosing a suitable algorithm for a given application remains a challenging design decision, often informed by the literature on anomaly detection algorithms. We extensively reviewed twelve of the most popular unsupervised anomaly detection methods. We observed that, so far, they have been compared using inconsistent protocols - the choice of the class of interest or the positive class, the split of training and test data, and the choice of hyperparameters - leading to ambiguous evaluations. This observation led us to define a coherent evaluation protocol which we then used to produce an updated and more precise picture of the relative performance of the twelve methods on five widely used tabular datasets. While our evaluation cannot pinpoint a method that outperforms all the others on all datasets, it identifies those that stand out and revise misconceived knowledge about their relative performances.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.