Skip to main content

Showing 1–12 of 12 results for author: Bou-Harb, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.03374  [pdf, other

    cs.SE cs.AI

    LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward

    Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Mohammad Bahrami Karkevandi, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad

    Abstract: In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functional code development. Nevertheless, it remains a notable concern that such tools are also responsible for creating insecure code, predominantly because… ▽ More

    Submitted 21 February, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

  2. arXiv:2311.07760  [pdf, other

    cs.CR

    Ransomware Detection Using Federated Learning with Imbalanced Datasets

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, S. Uluagac, M. Rahouti, E. Bou-Harb, M. Safaei Pour

    Abstract: Ransomware is a type of malware which encrypts user data and extorts payments in return for the decryption keys. This cyberthreat is one of the most serious challenges facing organizations today and has already caused immense financial damage. As a result, many researchers have been develo** techniques to counter ransomware. Recently, the federated learning (FL) approach has also been applied fo… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 6 pages, 4 figures, 3 tables

  3. arXiv:2306.14090  [pdf, other

    cs.CR

    Federated Learning Approach for Distributed Ransomware Analysis

    Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning (ML) framework for early ransom… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: 8 figures, 4 tables

  4. IoT Threat Detection Testbed Using Generative Adversarial Networks

    Authors: Farooq Shaikh, Elias Bou-Harb, Aldin Vehabovic, Jorge Crichigno, Aysegul Yayimli, Nasir Ghani

    Abstract: The Internet of Things(IoT) paradigm provides persistent sensing and data collection capabilities and is becoming increasingly prevalent across many market sectors. However, most IoT devices emphasize usability and function over security, making them very vulnerable to malicious exploits. This concern is evidenced by the increased use of compromised IoT devices in large scale bot networks (botnets… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 8 pages, 5 figures

  5. Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno

    Abstract: Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions to tackle the latest threats, many of which may have relatively fewer samples to analyze. This paper presents a machine learning(ML) framework for early ransomw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 6 pages, 5 figures

  6. An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

    Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad

    Abstract: Over the years, open-source software systems have become prey to threat actors. Even as open-source communities act quickly to patch the breach, code vulnerability screening should be an integral part of agile software development from the beginning. Unfortunately, current vulnerability screening techniques are ineffective at identifying novel vulnerabilities or providing developers with code vuln… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  7. Ransomware Detection and Classification Strategies

    Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli

    Abstract: Ransomware uses encryption methods to make data inaccessible to legitimate users. To date a wide range of ransomware families have been developed and deployed, causing immense damage to governments, corporations, and private users. As these cyberthreats multiply, researchers have proposed a range of ransomware detection and classification schemes. Most of these methods use advanced machine learnin… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 9 pages, 2 figures

  8. An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

    Authors: Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb

    Abstract: Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols. This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hardcoded by vendors, inducing a lengthy, costly, and inflexible process. Recently, data plane programmability has attracted significant attention from both the researc… ▽ More

    Submitted 7 June, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  9. Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning

    Authors: Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Achieving high performance for facial age estimation with subjects in the borderline between adulthood and non-adulthood has always been a challenge. Several studies have used different approaches from the age of a baby to an elder adult and different datasets have been employed to measure the mean absolute error (MAE) ranging between 1.47 to 8 years. The weakness of the algorithms specifically in… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Journal ref: 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 2019

  10. arXiv:1802.01719  [pdf, ps, other

    cs.CR cs.NI

    Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets

    Authors: Christian Miranda, Georges Kaddoum, Elias Bou-Harb

    Abstract: Creating a secure environment for communications is becoming a significantly challenging task in 5G Heterogeneous Networks (HetNets) given the stringent latency and high capacity requirements of 5G networks. This is particularly factual knowing that the infrastructure tends to be highly diversified especially with the continuous deployment of small cells. In fact, frequent handovers in these cells… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

    Comments: Strong Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets

  11. arXiv:1610.05462  [pdf, other

    cs.CY cs.CR

    Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit

    Authors: Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon

    Abstract: Digital forensic evidence acquisition speed is traditionally limited by two main factors: the read speed of the storage device being investigated, i.e., the read speed of the disk, memory, remote storage, mobile device, etc.), and the write speed of the system used for storing the acquired data. Digital forensic investigators can somewhat mitigate the latter issue through the use of high-speed sto… ▽ More

    Submitted 20 October, 2016; v1 submitted 18 October, 2016; originally announced October 2016.

  12. Fingerprinting Internet DNS Amplification DDoS Activities

    Authors: Claude Fachkha, Elias Bou-Harb, Mourad Debbabi

    Abstract: This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work is to extract cyber security inte… ▽ More

    Submitted 5 November, 2013; v1 submitted 15 October, 2013; originally announced October 2013.

    Comments: 5 pages, 2 figures