Skip to main content

Showing 1–4 of 4 results for author: Aaraj, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.11130  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Automated Map** of CVE Vulnerability Records to MITRE CWE Weaknesses

    Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare

    Abstract: In recent years, a proliferation of cyber-security threats and diversity has been on the rise culminating in an increase in their reporting and analysis. To counter that, many non-profit organizations have emerged in this domain, such as MITRE and OSWAP, which have been actively tracking vulnerabilities, and publishing defense recommendations in standardized formats. As producing data in such form… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: cybersecurity, MITRE, CVE, CWE

    MSC Class: 68T50 ACM Class: F.2.2; I.2.7

  2. arXiv:2301.04314  [pdf, other

    cs.CR

    ML-FEED: Machine Learning Framework for Efficient Exploit Detection

    Authors: Tanujay Saha, Tamjid Al-Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha

    Abstract: Machine learning (ML)-based methods have recently become attractive for detecting security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term memories (LSTMs) and transformers incur significant computation overheads. This overhead makes it infeasible to deploy them in real-time environments. We propose a novel ML-based exploit detection model, ML-FEED, that enab… ▽ More

    Submitted 6 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: This paper has been published in The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022

  3. arXiv:2108.03514  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

    Authors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha

    Abstract: The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network… ▽ More

    Submitted 7 August, 2021; originally announced August 2021.

    Comments: 17 pages, 11 figures, 13 tables, This paper has been submitted for review in IEEE Transactions on Emerging Topics in Computing. Copyright IEEE 2021

  4. SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

    Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha

    Abstract: Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being deployed across multiple functionalities, ranging from healthcare devices and wearables to critical infrastructures, e.g., nuclear power plants, autonomous vehicles, smart cities, and smart homes. These devices are inherently not secure across their comprehensive software, hardware, and network stacks, thus pr… ▽ More

    Submitted 19 October, 2022; v1 submitted 7 January, 2021; originally announced January 2021.

    Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright

    Journal ref: IEEE Transactions on Emerging Topics in Computing, 2021