Skip to main content

Showing 1–14 of 14 results for author: Goel, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19596  [pdf, other

    cs.CR cs.AI cs.LG

    Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

    Authors: Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe

    Abstract: This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: The manuscript has been accepted as full paper at European Symposium on Research in Computer Security (ESORICS) 2024

  2. arXiv:2404.03662  [pdf, other

    cs.NI cs.AI

    X-lifecycle Learning for Cloud Incident Management using LLMs

    Authors: Drishti Goel, Fiza Husain, Aditya Singh, Supriyo Ghosh, Anjaly Parayil, Chetan Bansal, Xuchao Zhang, Saravan Rajmohan

    Abstract: Incident management for large cloud services is a complex and tedious process and requires significant amount of manual efforts from on-call engineers (OCEs). OCEs typically leverage data from different stages of the software development lifecycle [SDLC] (e.g., codes, configuration, monitor data, service properties, service dependencies, trouble-shooting documents, etc.) to generate insights for d… ▽ More

    Submitted 15 February, 2024; originally announced April 2024.

  3. arXiv:2403.15169  [pdf, other

    cs.SE

    Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures

    Authors: Majid Abdulsatar, Hussain Ahmad, Diksha Goel, Faheem Ullah

    Abstract: The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security r… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  4. arXiv:2310.10667  [pdf, other

    cs.CR cs.LG

    Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

    Authors: Diksha Goel

    Abstract: With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly complex. Due to the increased complexity, networks are more prone to hardware faults and highly susceptible to cyber-attacks. Therefore, for rapidly growing network-centric applications, network resilience is essential to minimize… ▽ More

    Submitted 21 September, 2023; originally announced October 2023.

    Comments: PhD Thesis

  5. arXiv:2305.11657  [pdf, other

    cs.GT

    Cost Sharing Public Project with Minimum Release Delay

    Authors: Mingyu Guo, Diksha Goel, Guanhua Wang, Yong Yang, Muhammad Ali Babar

    Abstract: We study the excludable public project model where the decision is binary (build or not build). In a classic excludable and binary public project model, an agent either consumes the project in its whole or is completely excluded. We study a setting where the mechanism can set different project release time for different agents, in the sense that high-paying agents can consume the project earlier t… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.07315

  6. arXiv:2304.03998  [pdf, other

    cs.NE

    Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems

    Authors: Diksha Goel, Aneta Neumann, Frank Neumann, Hung Nguyen, Mingyu Guo

    Abstract: We study a Stackelberg game between one attacker and one defender in a configurable environment. The defender picks a specific environment configuration. The attacker observes the configuration and attacks via Reinforcement Learning (RL trained against the observed environment). The defender's goal is to find the environment with minimum achievable reward for the attacker. We apply Evolutionary Di… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

  7. arXiv:2302.13292  [pdf, other

    cs.SI

    Discovering Top-k Structural Hole Spanners in Dynamic Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). Numerous solutions are proposed to discover SHSs; however, most of the solutions are only applicable to static networks. Since real-world networks are dynamic networks; consequentl… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2212.08239

  8. arXiv:2302.12442  [pdf, other

    cs.SI

    Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: A Structural Hole Spanner (SHS) is a set of nodes in a network that act as a bridge among different otherwise disconnected communities. Numerous solutions have been proposed to discover SHSs that generally require high run time on large-scale networks. Another challenge is discovering SHSs across different types of networks for which the traditional one-model-fit-all approach fails to capture the… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  9. arXiv:2212.08239  [pdf, other

    cs.SI

    Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). SHSs have many applications, including viral marketing, information dissemination, community detection, etc. Numerous solutions are proposed to discover SHSs; however, most of the… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  10. arXiv:2210.09962  [pdf, other

    cs.CV

    Nighttime Dehaze-Enhancement

    Authors: Harshan Baskar, Anirudh S Chakravarthy, Prateek Garg, Divyam Goel, Abhijith S Raj, Kshitij Kumar, Lakshya, Ravichandra Parvatham, V Sushant, Bijay Kumar Rout

    Abstract: In this paper, we introduce a new computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing -- our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  11. arXiv:2209.01346  [pdf, other

    cs.DC cs.AI cs.AR cs.NI cs.PF

    HammingMesh: A Network Topology for Large-Scale Deep Learning

    Authors: Torsten Hoefler, Tommaso Bonato, Daniele De Sensi, Salvatore Di Girolamo, Shigang Li, Marco Heddes, Jon Belk, Deepak Goel, Miguel Castro, Steve Scott

    Abstract: Numerous microarchitectural optimizations unlocked tremendous processing power for deep neural networks that in turn fueled the AI revolution. With the exhaustion of such optimizations, the growth of modern AI is now gated by the performance of training systems, especially their data movement. Instead of focusing on single accelerators, we investigate data-movement characteristics of large-scale t… ▽ More

    Submitted 21 October, 2022; v1 submitted 3 September, 2022; originally announced September 2022.

    Comments: published at ACM/IEEE Supercomputing (SC22)

  12. arXiv:2205.13164  [pdf, other

    cs.CL cs.LG

    Leveraging Dependency Grammar for Fine-Grained Offensive Language Detection using Graph Convolutional Networks

    Authors: Divyam Goel, Raksha Sharma

    Abstract: The last few years have witnessed an exponential rise in the propagation of offensive text on social media. Identification of this text with high precision is crucial for the well-being of society. Most of the existing approaches tend to give high toxicity scores to innocuous statements (e.g., "I am a gay man"). These false positives result from over-generalization on the training data where speci… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Comments: 10 pages, 2 figures, accepted as a long paper at The 10th International Workshop on Natural Language Processing for Social Media (SocialNLP @ NAACL 2022)

  13. arXiv:2204.08653  [pdf, other

    cs.SE cs.CL cs.LG

    On The Cross-Modal Transfer from Natural Language to Code through Adapter Modules

    Authors: Divyam Goel, Ramansh Grover, Fatemeh H. Fard

    Abstract: Pre-trained neural Language Models (PTLM), such as CodeBERT, are recently used in software engineering as models pre-trained on large source code corpora. Their knowledge is transferred to downstream tasks (e.g. code clone detection) via fine-tuning. In natural language processing (NLP), other alternatives for transferring the knowledge of PTLMs are explored through using adapters, compact, parame… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: 11 pages, 6 figures, ICPC 2022. 30th International Conference on Program Comprehension (ICPC '22), May 16--17, 2022, Virtual Event, USA}

  14. Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

    Authors: Diksha Goel, Max Ward, Aneta Neumann, Frank Neumann, Hung Nguyen, Mingyu Guo

    Abstract: Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize thei… ▽ More

    Submitted 4 January, 2023; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Added reference [12] on page 3 and 4. Corrected spelling EVC to VEC on page 10

    Journal ref: Proceedings of the Genetic and Evolutionary Computation Conference, 2022, Pages 1191 to 1199