Skip to main content

Showing 1–2 of 2 results for author: Jamieson, J D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1805.09676  [pdf, other

    cs.CR cs.AI cs.HC

    Forming IDEAS Interactive Data Exploration & Analysis System

    Authors: Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch

    Abstract: Modern cyber security operations collect an enormous amount of logging and alerting data. While analysts have the ability to query and compute simple statistics and plots from their data, current analytical tools are too simple to admit deep understanding. To detect advanced and novel attacks, analysts turn to manual investigations. While commonplace, current investigations are time-consuming, int… ▽ More

    Submitted 20 June, 2018; v1 submitted 24 May, 2018; originally announced May 2018.

    Comments: 4 page short paper on IDEAS System, 4 figures

    Journal ref: Workshop on Information Security Workers, USENIX SOUPS 2018

  2. arXiv:1710.09422  [pdf, other

    cs.CR cs.DS stat.AP

    Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors

    Authors: Robert A. Bridges, Jessie D. Jamieson, Joel W. Reed

    Abstract: Anomaly detection (AD) has garnered ample attention in security research, as such algorithms complement existing signature-based methods but promise detection of never-before-seen attacks. Cyber operations manage a high volume of heterogeneous log data; hence, AD in such operations involves multiple (e.g., per IP, per data type) ensembles of detectors modeling heterogeneous characteristics (e.g.,… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: 11 pages, 5 figures. Proceedings of IEEE Big Data Conference, 2017