Skip to main content

Showing 1–8 of 8 results for author: Alavizadeh, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.02223  [pdf, other

    cs.CR cs.AI

    A Game-Theoretic Approach for AI-based Botnet Attack Defence

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection. Unfortunately, there has not been an existing assessment tool capable of evaluating the effectiveness of existing defense strategies against this kind of AI-based botnet attack. In this paper, we propose a sequential game theory model tha… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  2. arXiv:2111.13978  [pdf, other

    cs.CR cs.AI

    Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh

    Abstract: The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of learning to make decisions without the knowledge of human experts. Several reinforcement learning methods (e.g., Markov) for automated network intrusion tasks have been proposed in recent years. In this paper, we introduce a new generation of… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  3. arXiv:2110.15747  [pdf, other

    cs.CR cs.NI

    A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim

    Abstract: Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats,… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: 25 pages

  4. arXiv:2107.09258  [pdf, other

    cs.GT

    A Markov Game Model for AI-based Cyber Security Attack Mitigation

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current cyber-defense systems encounter various challenges to defend against such new and emerging threats. Modeling AI-aided threats through game theory models can help the defender to select optimal strategies against the attacks and make wise de… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: 11 pages

  5. arXiv:2009.02030  [pdf, other

    cs.CR

    Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud

    Authors: Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard

    Abstract: Moving Target Defense (MTD) is a proactive security mechanism which changes the attack surface aiming to confuse attackers. Cloud computing leverages MTD techniques to enhance cloud security posture against cyber threats. While many MTD techniques have been applied to cloud computing, there has not been a joint evaluation of the effectiveness of MTD techniques with respect to security and economic… ▽ More

    Submitted 19 June, 2021; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: 16 pages

  6. arXiv:2009.01604  [pdf, other

    cs.CR

    Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud

    Authors: Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard

    Abstract: The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the cloud providers are responsible for the security of the cloud, there are still many security concerns due to inherently complex model the cloud providers operate on (e.g.,multi-tenancy). In addition, the enterprises whose services have migr… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Comments: 9 pages

  7. arXiv:1909.08092  [pdf, other

    cs.NI cs.GT

    Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

    Authors: **-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson

    Abstract: Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing a reality with the proliferation of persistent, advanced, intelligent attacks while defenders are ofte… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: 36 pages, 15 figures

  8. arXiv:1904.01758  [pdf, other

    cs.CR

    An Automated Security Analysis Framework and Implementation for Cloud

    Authors: Hootan Alavizadeh, Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz

    Abstract: Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate their services to the cloud to utilize the benefit of cloud computing such as eliminating the capital expense of their computing need. There are security vulnerabilities and threats in the cloud. Many researches have been proposed to analyze… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: 8 pages, 8 figures