Skip to main content

Showing 1–50 of 60 results for author: Camtepe, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19596  [pdf, other

    cs.CR cs.AI cs.LG

    Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

    Authors: Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe

    Abstract: This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: The manuscript has been accepted as full paper at European Symposium on Research in Computer Security (ESORICS) 2024

  2. arXiv:2406.03404  [pdf, other

    cs.LG cs.AI cs.CR

    ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

    Authors: Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, DuYong Kim, Hamid Menouar, Flora D. Salim

    Abstract: Spatiotemporal data is prevalent in a wide range of edge devices, such as those used in personal communication and financial transactions. Recent advancements have sparked a growing interest in integrating spatiotemporal analysis with large-scale language models. However, spatiotemporal data often contains sensitive information, making it unsuitable for open third-party access. To address this cha… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. arXiv:2405.15258  [pdf, other

    cs.CR

    Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure

    Authors: Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang

    Abstract: AI-enabled critical infrastructures (ACIs) integrate artificial intelligence (AI) technologies into various essential systems and services that are vital to the functioning of society, offering significant implications for efficiency, security and resilience. While adopting decentralized AI approaches (such as federated learning technology) in ACIs is plausible, private and sensitive data are stil… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  4. arXiv:2405.03316  [pdf, other

    cs.LG cs.CR

    Provably Unlearnable Examples

    Authors: Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu

    Abstract: The exploitation of publicly accessible data has led to escalating concerns regarding data privacy and intellectual property (IP) breaches in the age of artificial intelligence. As a strategy to safeguard both data privacy and IP-related domain knowledge, efforts have been undertaken to render shared data unlearnable for unauthorized models in the wild. Existing methods apply empirically optimized… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  5. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  6. arXiv:2312.07821  [pdf, other

    quant-ph cs.LG

    Radio Signal Classification by Adversarially Robust Quantum Machine Learning

    Authors: Yanqiu Wu, Eromanga Adermann, Chandra Thapa, Seyit Camtepe, Hajime Suzuki, Muhammad Usman

    Abstract: Radio signal classification plays a pivotal role in identifying the modulation scheme used in received radio signals, which is essential for demodulation and proper interpretation of the transmitted information. Researchers have underscored the high susceptibility of ML algorithms for radio signal classification to adversarial attacks. Such vulnerability could result in severe consequences, includ… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 12 pages, 6 figures

  7. arXiv:2309.16207  [pdf, other

    cs.CV

    Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

    Authors: Huihui Gong, Min**g Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

    Abstract: Adversarial training serves as one of the most popular and effective methods to defend against adversarial perturbations. However, most defense mechanisms only consider a single type of perturbation while various attack methods might be adopted to perform stronger adversarial attacks against the deployed model in real-world scenarios, e.g., $\ell_2$ or $\ell_\infty$. Defending against various atta… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 9 pages, 2 figures

  8. arXiv:2309.09480  [pdf, other

    cs.CV

    Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

    Authors: Huihui Gong, Min**g Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

    Abstract: Deep neural networks (DNNs) have achieved state-of-the-art performance on face recognition (FR) tasks in the last decade. In real scenarios, the deployment of DNNs requires taking various face accessories into consideration, like glasses, hats, and masks. In the COVID-19 pandemic era, wearing face masks is one of the most effective ways to defend against the novel coronavirus. However, DNNs are kn… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 11 pages, 7 figures

  9. arXiv:2308.11269  [pdf, other

    cs.LG quant-ph

    Quantum-Inspired Machine Learning: a Survey

    Authors: Larry Huynh, ** Hong, Ajmal Mian, Hajime Suzuki, Yanqiu Wu, Seyit Camtepe

    Abstract: Quantum-inspired Machine Learning (QiML) is a burgeoning field, receiving global attention from researchers for its potential to leverage principles of quantum mechanics within classical computational frameworks. However, current review literature often presents a superficial exploration of QiML, focusing instead on the broader Quantum Machine Learning (QML) field. In response to this gap, this su… ▽ More

    Submitted 8 September, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: 59 pages, 13 figures, 9 tables. - Edited for spelling, grammar, and corrected minor typos in formulas - Adjusted wording in places for better clarity - Corrected contact info - Added Table 1 to clarify variables used in dequantized algs. - Added subsections in QVAS discussing QCBMs and TN-based VQC models - Included additional references as requested by authors to ensure a more exhaustive survey

    MSC Class: 68Q09 ACM Class: A.1; I.5.4

  10. arXiv:2308.07860  [pdf, other

    cs.CR

    SplITS: Split Input-to-State Map** for Effective Firmware Fuzzing

    Authors: Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe

    Abstract: Ability to test firmware on embedded devices is critical to discovering vulnerabilities prior to their adversarial exploitation. State-of-the-art automated testing methods rehost firmware in emulators and attempt to facilitate inputs from a diversity of methods (interrupt driven, status polling) and a plethora of devices (such as modems and GPS units). Despite recent progress to tackle peripheral… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: Accepted ESORICS 2023

  11. arXiv:2308.05126  [pdf, other

    cs.CR

    Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper

    Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe

    Abstract: As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today's digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic threats because they are mainly intuitional. One of the most promising ways to handle this ongoing problem is utilizing the potential of data-driven intel… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: 15 pages, Springer

  12. arXiv:2306.17190  [pdf, other

    cs.CR cs.LG

    Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe

    Abstract: DDoS attacks involve overwhelming a target system with a large number of requests or traffic from multiple sources, disrupting the normal traffic of a targeted server, service, or network. Distinguishing between legitimate traffic and malicious traffic is a challenging task. It is possible to classify legitimate traffic and malicious traffic and analysis the network traffic by using machine learni… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: 14 pages

  13. arXiv:2306.03379  [pdf, other

    cs.CR cs.DB

    OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy

    Authors: M. A. P. Chamikara, Seung Ick Jang, Ian Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David

    Abstract: Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential privacy (DP) is regarded as the gold standard in data privacy. Despite this, current DP methods tend to generate privacy-preserving tabular datasets tha… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  14. arXiv:2305.09475  [pdf, other

    cs.CR cs.LG

    Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore

    Abstract: A Distributed Denial-of-service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a targeted server, service, or network by sending a flood of traffic to overwhelm the target or its surrounding infrastructure. As technology improves, new attacks have been developed by hackers. Traditional statistical and shallow machine learning techniques can detect superficial anomalies base… ▽ More

    Submitted 20 April, 2023; originally announced May 2023.

    Comments: 13 pages

  15. Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps

    Authors: Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal

    Abstract: The digital age has brought a world of opportunity to children. Connectivity can be a game-changer for some of the world's most marginalized children. However, while legislatures around the world have enacted regulations to protect children's online privacy, and app stores have instituted various protections, privacy in mobile apps remains a growing concern for parents and wider society. In this p… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: Accepted at the Web Conference 2023

  16. arXiv:2303.00307  [pdf, other

    cs.CR cs.NI eess.SP

    Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

    Authors: Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe

    Abstract: Physical-layer authentication is a popular alternative to the conventional key-based authentication for internet of things (IoT) devices due to their limited computational capacity and battery power. However, this approach has limitations due to poor robustness under channel fluctuations, reconciliation overhead, and no clear safeguard distance to ensure the secrecy of the generated authentication… ▽ More

    Submitted 6 November, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: Accepted for publication in IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, vol. 11, no. 7, pp. 11312-11326, April, 2024

  17. arXiv:2302.01550  [pdf, other

    cs.LG

    Vertical Federated Learning: Taxonomies, Threats, and Prospects

    Authors: Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit A. Camtepe, Anmin Fu, Yansong Gao

    Abstract: Federated learning (FL) is the most popular distributed machine learning technique. FL allows machine-learning models to be trained without acquiring raw data to a single point for processing. Instead, local models are trained with local data; the models are then shared and combined. This approach preserves data privacy as locally trained models are shared instead of the raw data themselves. Broad… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  18. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  19. arXiv:2209.10414  [pdf, other

    cs.CR cs.AI cs.LG

    Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning

    Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung

    Abstract: Software vulnerabilities are a serious and crucial concern. Typically, in a program or function consisting of hundreds or thousands of source code statements, there are only a few statements causing the corresponding vulnerabilities. Most current approaches to vulnerability labelling are done on a function or program level by experts with the assistance of machine learning tools. Extending this ap… ▽ More

    Submitted 11 June, 2024; v1 submitted 19 September, 2022; originally announced September 2022.

  20. arXiv:2209.06392  [pdf, other

    eess.SP cs.LG cs.NI

    Joint User and Data Detection in Grant-Free NOMA with Attention-based BiLSTM Network

    Authors: Saud Khan, Salman Durrani, Muhammad Basit Shahab, Sarah J. Johnson, Seyit Camtepe

    Abstract: We consider the multi-user detection (MUD) problem in uplink grant-free non-orthogonal multiple access (NOMA), where the access point has to identify the total number and correct identity of the active Internet of Things (IoT) devices and decode their transmitted data. We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-… ▽ More

    Submitted 12 July, 2023; v1 submitted 13 September, 2022; originally announced September 2022.

    Journal ref: IEEE Open Journal of the Communications Society, vol. 4, pp. 1499-1515, 2023

  21. Compression Optimality of Asymmetric Numeral Systems

    Authors: Josef Pieprzyk, Jarek Duda, Marcin Pawlowski, Seyit Camtepe, Arash Mahboubi, Pawel Morawiecki

    Abstract: Compression also known as entropy coding has a rich and long history. However, a recent explosion of multimedia Internet applications (such as teleconferencing and video streaming for instance) renews an interest in fast compression that also squeezes out as much redundancy as possible. In 2009 Jarek Duda invented his asymmetric numeral system (ANS). Apart from a beautiful mathematical structure,… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  22. arXiv:2208.12449  [pdf, other

    cs.CR cs.CY

    Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal

    Abstract: The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC) personnel worldwide. They are at the forefront of an organisation's cybersecurity infrastructure, and face the unenviable task of prioritising threats amongst a flood of abstruse alerts triggered by their Security Information and Event Management (SIEM) systems. URLs found within malicious communications form the b… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.12726

  23. arXiv:2207.10242  [pdf, other

    cs.CR

    Malware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework

    Authors: **ting Zhu, Julian Jang-Jaccard, Ian Welch, Harith Al-Sahaf, Seyit Camtepe

    Abstract: To enhance the efficiency of incident response triage operations, it is not cost-effective to defend all systems equally in a complex cyber environment. Instead, prioritizing the defense of critical functionality and the most vulnerable systems is desirable. Threat intelligence is crucial for guiding Security Operations Center (SOC) analysts' focus toward specific system activity and provides the… ▽ More

    Submitted 25 March, 2023; v1 submitted 20 July, 2022; originally announced July 2022.

  24. arXiv:2207.03113  [pdf, other

    cs.LG cs.AI

    An Additive Instance-Wise Approach to Multi-class Model Interpretation

    Authors: Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Phung

    Abstract: Interpretable machine learning offers insights into what factors drive a certain prediction of a black-box system. A large number of interpreting methods focus on identifying explanatory input features, which generally fall into two main categories: attribution and selection. A popular attribution-based approach is to exploit local neighborhoods for learning instance-specific explainers in an addi… ▽ More

    Submitted 9 February, 2023; v1 submitted 7 July, 2022; originally announced July 2022.

    Journal ref: In The Eleventh International Conference on Learning Representations, 2023

  25. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  26. arXiv:2204.06701  [pdf, other

    cs.LG cs.CR

    LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic

    Abstract: Anomaly detection for indoor air quality (IAQ) data has become an important area of research as the quality of air is closely related to human health and well-being. However, traditional statistics and shallow machine learning-based approaches in anomaly detection in the IAQ area could not detect anomalies involving the observation of correlations across several data points (i.e., often referred t… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 14 pages, 16 figures, 5 tables

  27. arXiv:2204.03214  [pdf, other

    cs.CR cs.AI cs.LG

    Transformer-Based Language Models for Software Vulnerability Detection

    Authors: Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

    Abstract: The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related domains, and the closeness of natural languages to high-level programming languages, such as C/C++, this work studies how to leverage (large) transformer-based language models in detec… ▽ More

    Submitted 5 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 16 pages

  28. arXiv:2204.00985  [pdf, other

    cs.CR cs.LG

    Towards Web Phishing Detection Limitations and Mitigation

    Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: Web phishing remains a serious cyber threat responsible for most data breaches. Machine Learning (ML)-based anti-phishing detectors are seen as an effective countermeasure, and are increasingly adopted by web-browsers and software products. However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solution… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: 12 pages

  29. arXiv:2203.10902  [pdf, other

    cs.CR cs.AI

    PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

    Authors: Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

    Abstract: Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a publ… ▽ More

    Submitted 19 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 18 pages, 9 figures. Accepted to IEEE S&P 2023

  30. arXiv:2202.10320  [pdf, other

    cs.CV cs.CR cs.LG

    Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

    Authors: Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor

    Abstract: Biometric data, such as face images, are often associated with sensitive information (e.g medical, financial, personal government records). Hence, a data breach in a system storing such information can have devastating consequences. Deep learning is widely utilized for face recognition (FR); however, such models are vulnerable to backdoor attacks executed by malicious parties. Backdoor attacks cau… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: 15 pages

  31. arXiv:2202.06053  [pdf, other

    cs.CR cs.DB

    Local Differential Privacy for Federated Learning

    Authors: M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil

    Abstract: Advanced adversarial attacks such as membership inference and model memorization can make federated learning (FL) vulnerable and potentially leak sensitive private data. Local differentially private (LDP) approaches are gaining more popularity due to stronger privacy notions and native support for data distribution compared to other differentially private (DP) solutions. However, DP approaches ass… ▽ More

    Submitted 3 August, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: 17 pages

  32. arXiv:2112.02223  [pdf, other

    cs.CR cs.AI

    A Game-Theoretic Approach for AI-based Botnet Attack Defence

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection. Unfortunately, there has not been an existing assessment tool capable of evaluating the effectiveness of existing defense strategies against this kind of AI-based botnet attack. In this paper, we propose a sequential game theory model tha… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  33. A Few-Shot Meta-Learning based Siamese Neural Network using Entropy Features for Ransomware Classification

    Authors: **ting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith AI-Sahaf, Seyit Camtepe

    Abstract: Ransomware defense solutions that can quickly detect and classify different ransomware classes to formulate rapid response plans have been in high demand in recent years. Though the applicability of adopting deep learning techniques to provide automation and self-learning provision has been proven in many application domains, the lack of data available for ransomware (and other malware)samples has… ▽ More

    Submitted 10 April, 2022; v1 submitted 1 December, 2021; originally announced December 2021.

    Journal ref: Computers & Security,Volume 117, June 2022, 102691

  34. arXiv:2111.10085  [pdf, other

    cs.CR cs.LG

    Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors

    Authors: Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Hao** Zhu, Seyit Camtepe, Surya Nepal

    Abstract: Numerous open-source and commercial malware detectors are available. However, their efficacy is threatened by new adversarial attacks, whereby malware attempts to evade detection, e.g., by performing feature-space manipulation. In this work, we propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors when confronted with adversarial attacks. The fra… ▽ More

    Submitted 27 November, 2023; v1 submitted 19 November, 2021; originally announced November 2021.

    Comments: Accepted at ESEC/FSE 2023. https://doi.org/10.1145/3611643.3616309

  35. arXiv:2111.08217  [pdf, other

    cs.CR

    NatiDroid: Cross-Language Android Permission Specification

    Authors: Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang

    Abstract: The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation providing the complete list of permission-protected APIs and the corresponding permissions to date. Researchers have spent significant efforts extracting such API protection map** fro… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

  36. arXiv:2110.15747  [pdf, other

    cs.CR cs.NI

    A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim

    Abstract: Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats,… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: 25 pages

  37. Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware

    Authors: **ting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe

    Abstract: Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware families when such obfuscated malware samples are present in the training dataset, resulting in high false-positive rates. To address this issue, we prop… ▽ More

    Submitted 14 June, 2023; v1 submitted 26 October, 2021; originally announced October 2021.

    Journal ref: Future Internet 2023, 15(6), 214

  38. arXiv:2109.14208  [pdf, other

    cs.GT cs.CR

    A Communication Security Game on Switched Systems for Autonomous Vehicle Platoons

    Authors: Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe

    Abstract: Vehicle-to-vehicle communication enables autonomous platoons to boost traffic efficiency and safety, while ensuring string stability with a constant spacing policy. However, communication-based controllers are susceptible to a range of cyber-attacks. In this paper, we propose a distributed attack mitigation defense framework with a dual-mode control system reconfiguration scheme to prevent a compr… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 9 pages, 5 figures; full version of paper accepted to CDC2021

  39. arXiv:2109.09246  [pdf, other

    cs.LG cs.AI

    Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance

    Authors: Praveen Joshi, Chandra Thapa, Seyit Camtepe, Mohammed Hasanuzzamana, Ted Scully, Haithem Afli

    Abstract: Federated Learning (FL), Split Learning (SL), and SplitFed Learning (SFL) are three recent developments in distributed machine learning that are gaining attention due to their ability to preserve the privacy of raw data. Thus, they are widely applicable in various domains where data is sensitive, such as large-scale medical image classification, internet-of-medical-things, and cross-organization p… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: CERC 2021

  40. arXiv:2108.12726  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Characterizing Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: URLs are central to a myriad of cyber-security threats, from phishing to the distribution of malware. Their inherent ease of use and familiarity is continuously abused by attackers to evade defences and deceive end-users. Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware. We refer to such behaviours as campaigns, with the hypothesis bei… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  41. arXiv:2107.09258  [pdf, other

    cs.GT

    A Markov Game Model for AI-based Cyber Security Attack Mitigation

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current cyber-defense systems encounter various challenges to defend against such new and emerging threats. Modeling AI-aided threats through game theory models can help the defender to select optimal strategies against the attacks and make wise de… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: 11 pages

  42. FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

    Authors: Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal

    Abstract: An integrated clinical environment (ICE) enables the connection and coordination of the internet of medical things around the care of patients in hospitals. However, ransomware attacks and their spread on hospital infrastructures, including ICE, are rising. Often the adversaries are targeting multiple hospitals with the same ransomware attacks. These attacks are detected by using machine learning… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 402), 2021

  43. arXiv:2103.02762  [pdf, other

    cs.LG cs.CR cs.NI

    Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

    Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

    Abstract: Federated learning (FL) and split learning (SL) are state-of-the-art distributed machine learning techniques to enable machine learning training without accessing raw data on clients or end devices. However, their \emph{comparative training performance} under real-world resource-restricted Internet of Things (IoT) device settings, e.g., Raspberry Pi, remains barely studied, which, to our knowledge… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2003.13376

  44. arXiv:2101.12434  [pdf, ps, other

    cs.CR

    Peeler: Profiling Kernel-Level Events to Detect Ransomware

    Authors: Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal

    Abstract: Ransomware is a growing threat that typically operates by either encrypting a victim's files or locking a victim's computer until the victim pays a ransom. However, it is still challenging to detect such malware timely with existing traditional malware detection techniques. In this paper, we present a novel ransomware detection system, called "Peeler" (Profiling kErnEl -Level Events to detect Rans… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 15 pages, 10 figures

  45. arXiv:2101.10027  [pdf, other

    cs.LG cs.AI cs.CV

    Understanding and Achieving Efficient Robustness with Adversarial Supervised Contrastive Learning

    Authors: Anh Bui, Trung Le, He Zhao, Paul Montague, Seyit Camtepe, Dinh Phung

    Abstract: Contrastive learning (CL) has recently emerged as an effective approach to learning representation in a range of downstream tasks. Central to this approach is the selection of positive (similar) and negative (dissimilar) sets to provide the model the opportunity to `contrast' between data and class representation in the latent space. In this paper, we investigate CL for improving model robustness… ▽ More

    Submitted 22 October, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

  46. arXiv:2011.14818  [pdf, other

    cs.LG cs.AI cs.CR

    Advancements of federated learning towards privacy preservation: from federated learning to split learning

    Authors: Chandra Thapa, M. A. P. Chamikara, Seyit A. Camtepe

    Abstract: In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed clients (ranging from two to millions) such as mobile ph… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: Authors' preprint version (before any peer-review) of a book chapter to appear in the Book series "Studies in Computational Intelligence", Book title "Federated Learning Systems: Towards Next-generation AI", Book eds. Muhammad Habib ur Rehman and Mohamed Medhat Gaber, Publisher "Springer Nature Switzerland AG Gewerbestrasse 11, 6330 Cham, Switzerland."

  47. Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

    Authors: Chandra Thapa, Seyit Camtepe

    Abstract: Precision health leverages information from various sources, including omics, lifestyle, environment, social media, medical records, and medical insurance claims to enable personalized care, prevent and predict illness, and precise treatments. It extensively uses sensing technologies (e.g., electronic health monitoring devices), computations (e.g., machine learning), and communication (e.g., inter… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

    Comments: 35 pages, 3 figures, 7 tables

    Journal ref: Computers in Biology and Medicine 129 (2021) 104130

  48. arXiv:2007.13300  [pdf, other

    cs.LG cs.CR

    Evaluation of Federated Learning in Phishing Email Detection

    Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng

    Abstract: The use of Artificial Intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which opens it up to a myriad of privacy, trust, and legal issues. Moreover, organizations are loathed to share emails, given the risk of leakage of commercially sensitive information. So, it is uncommon to obtain sufficient emails to train a global AI model efficiently. Ac… ▽ More

    Submitted 21 May, 2021; v1 submitted 26 July, 2020; originally announced July 2020.

    Comments: Submitted for journal publication

  49. PPaaS: Privacy Preservation as a Service

    Authors: Pathum Chamikara Mahawaga Arachchige, Peter Bertok, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe

    Abstract: Personally identifiable information (PII) can find its way into cyberspace through various channels, and many potential sources can leak such information. Data sharing (e.g. cross-agency data sharing) for machine learning and analytics is one of the important components in data science. However, due to privacy concerns, data should be enforced with strong privacy guarantees before sharing. Differe… ▽ More

    Submitted 21 April, 2021; v1 submitted 4 July, 2020; originally announced July 2020.

  50. arXiv:2006.10933  [pdf, other

    cs.CR cs.SE

    An Empirical Assessment of Global COVID-19 Contact Tracing Applications

    Authors: Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe

    Abstract: The rapid spread of COVID-19 has made manual contact tracing difficult. Thus, various public health authorities have experimented with automatic contact tracing using mobile applications (or "apps"). These apps, however, have raised security and privacy concerns. In this paper, we propose an automated security and privacy assessment tool, COVIDGUARDIAN, which combines identification and analysis o… ▽ More

    Submitted 22 January, 2021; v1 submitted 18 June, 2020; originally announced June 2020.

    Journal ref: In proceedings of the 43rd International Conference on Software Engineering (ICSE 2021)