Skip to main content

Showing 1–3 of 3 results for author: Christopher, C J

Searching in archive cs. Search in all archives.
.
  1. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  2. arXiv:2111.12835  [pdf, other

    cs.DB cs.LG

    SchemaDB: Structures in Relational Datasets

    Authors: Cody James Christopher, Kristen Moore, David Liebowitz

    Abstract: In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats. Databases are not commonly shared publicly for reasons of privacy and security, so schemata are not available for study. Consequently, an understanding of database structures in the wild is lacking, and most examples found publicly belong to common development frameworks or… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

    Comments: Draft

  3. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

    Authors: Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey

    Abstract: Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves. However, despite being relatively cheap to deploy, the generation of realistic content at scale is very costly, due to the fact that rich, interactive deceptive technologies are largely hand-crafted. With recent improvements in Machine Learning, we now have the opportunity to b… ▽ More

    Submitted 23 November, 2022; v1 submitted 21 November, 2021; originally announced November 2021.

    Journal ref: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)