Skip to main content

Showing 1–21 of 21 results for author: Jang-Jaccard, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01601  [pdf, other

    cs.CY cs.CR cs.IR

    Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex

    Authors: Alessandro Tavazzi, Dimitri Percia David, Julian Jang-Jaccard, Alain Mermoud

    Abstract: Identifying technological convergence among emerging technologies in cybersecurity is crucial for advancing science and fostering innovation. Unlike previous studies focusing on the binary relationship between a paper and the concept it attributes to technology, our approach utilizes attribution scores to enhance the relationships between research papers, combining keywords, citation rates, and co… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

    Comments: 27 pages, 10 figures

  2. arXiv:2306.17190  [pdf, other

    cs.CR cs.LG

    Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe

    Abstract: DDoS attacks involve overwhelming a target system with a large number of requests or traffic from multiple sources, disrupting the normal traffic of a targeted server, service, or network. Distinguishing between legitimate traffic and malicious traffic is a challenging task. It is possible to classify legitimate traffic and malicious traffic and analysis the network traffic by using machine learni… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: 14 pages

  3. arXiv:2305.09475  [pdf, other

    cs.CR cs.LG

    Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore

    Abstract: A Distributed Denial-of-service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a targeted server, service, or network by sending a flood of traffic to overwhelm the target or its surrounding infrastructure. As technology improves, new attacks have been developed by hackers. Traditional statistical and shallow machine learning techniques can detect superficial anomalies base… ▽ More

    Submitted 20 April, 2023; originally announced May 2023.

    Comments: 13 pages

  4. arXiv:2302.08558  [pdf, other

    cs.CR cs.LG

    Generative Adversarial Networks for Malware Detection: a Survey

    Authors: Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, ** Kwak

    Abstract: Since their proposal in the 2014 paper by Ian Goodfellow, there has been an explosion of research into the area of Generative Adversarial Networks. While they have been utilised in many fields, the realm of malware research is a problem space in which GANs have taken root. From balancing datasets to creating unseen examples in rare classes, GAN models offer extensive opportunities for application.… ▽ More

    Submitted 24 February, 2023; v1 submitted 16 February, 2023; originally announced February 2023.

  5. arXiv:2208.09711  [pdf, other

    cs.CR cs.LG

    Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

    Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, ** Kwak

    Abstract: Machine learning algorithms have been widely used in intrusion detection systems, including Multi-layer Perceptron (MLP). In this study, we proposed a two-stage model that combines the Birch clustering algorithm and MLP classifier to improve the performance of network anomaly multi-classification. In our proposed method, we first apply Birch or Kmeans as an unsupervised clustering algorithm to the… ▽ More

    Submitted 30 October, 2022; v1 submitted 20 August, 2022; originally announced August 2022.

  6. arXiv:2207.10242  [pdf, other

    cs.CR

    Malware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework

    Authors: **ting Zhu, Julian Jang-Jaccard, Ian Welch, Harith Al-Sahaf, Seyit Camtepe

    Abstract: To enhance the efficiency of incident response triage operations, it is not cost-effective to defend all systems equally in a complex cyber environment. Instead, prioritizing the defense of critical functionality and the most vulnerable systems is desirable. Threat intelligence is crucial for guiding Security Operations Center (SOC) analysts' focus toward specific system activity and provides the… ▽ More

    Submitted 25 March, 2023; v1 submitted 20 July, 2022; originally announced July 2022.

  7. arXiv:2204.06701  [pdf, other

    cs.LG cs.CR

    LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic

    Abstract: Anomaly detection for indoor air quality (IAQ) data has become an important area of research as the quality of air is closely related to human health and well-being. However, traditional statistics and shallow machine learning-based approaches in anomaly detection in the IAQ area could not detect anomalies involving the observation of correlations across several data points (i.e., often referred t… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 14 pages, 16 figures, 5 tables

  8. arXiv:2204.03779  [pdf, other

    cs.CR

    Autoencoder-based Unsupervised Intrusion Detection using Multi-Scale Convolutional Recurrent Networks

    Authors: Amardeep Singh, Julian Jang-Jaccard

    Abstract: The massive growth of network traffic data leads to a large volume of datasets. Labeling these datasets for identifying intrusion attacks is very laborious and error-prone. Furthermore, network traffic data have complex time-varying non-linear relationships. The existing state-of-the-art intrusion detection solutions use a combination of various supervised approaches along with fused features subs… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: arXiv admin note: text overlap with arXiv:2111.00626

  9. IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset

    Authors: Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, **ting Zhu, Fariza Sabrina, ** Kwak

    Abstract: The effectiveness of machine learning models is significantly affected by the size of the dataset and the quality of features as redundant and irrelevant features can radically degrade the performance. This paper proposes IGRF-RFE: a hybrid feature selection method tasked for multi-class network anomalies using a Multilayer perceptron (MLP) network. IGRF-RFE can be considered as a feature reductio… ▽ More

    Submitted 5 February, 2023; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: 26 pages

  10. arXiv:2202.01332  [pdf, other

    cs.LG

    Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection

    Authors: Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina

    Abstract: The network intrusion detection task is challenging because of the imbalanced and unlabeled nature of the dataset it operates on. Existing generative adversarial networks (GANs), are primarily used for creating synthetic samples from reals. They also have been proved successful in anomaly detection tasks. In our proposed method, we construct the trained encoder-discriminator as a one-class classif… ▽ More

    Submitted 8 March, 2022; v1 submitted 2 February, 2022; originally announced February 2022.

    Comments: 16 pages, 8 figures

  11. arXiv:2112.02223  [pdf, other

    cs.CR cs.AI

    A Game-Theoretic Approach for AI-based Botnet Attack Defence

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection. Unfortunately, there has not been an existing assessment tool capable of evaluating the effectiveness of existing defense strategies against this kind of AI-based botnet attack. In this paper, we propose a sequential game theory model tha… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  12. A Few-Shot Meta-Learning based Siamese Neural Network using Entropy Features for Ransomware Classification

    Authors: **ting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith AI-Sahaf, Seyit Camtepe

    Abstract: Ransomware defense solutions that can quickly detect and classify different ransomware classes to formulate rapid response plans have been in high demand in recent years. Though the applicability of adopting deep learning techniques to provide automation and self-learning provision has been proven in many application domains, the lack of data available for ransomware (and other malware)samples has… ▽ More

    Submitted 10 April, 2022; v1 submitted 1 December, 2021; originally announced December 2021.

    Journal ref: Computers & Security,Volume 117, June 2022, 102691

  13. arXiv:2111.13978  [pdf, other

    cs.CR cs.AI

    Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh

    Abstract: The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of learning to make decisions without the knowledge of human experts. Several reinforcement learning methods (e.g., Markov) for automated network intrusion tasks have been proposed in recent years. In this paper, we introduce a new generation of… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  14. arXiv:2111.00626  [pdf, other

    cs.LG cs.CR

    Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold

    Authors: Amardeep Singh, Julian Jang-Jaccard

    Abstract: Network traffic data is a combination of different data bytes packets under different network protocols. These traffic packets have complex time-varying non-linear relationships. Existing state-of-the-art methods rise up to this challenge by fusing features into multiple subsets based on correlations and using hybrid classification techniques that extract spatial and temporal characteristics. This… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

  15. arXiv:2110.15747  [pdf, other

    cs.CR cs.NI

    A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim

    Abstract: Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats,… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: 25 pages

  16. Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware

    Authors: **ting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe

    Abstract: Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware families when such obfuscated malware samples are present in the training dataset, resulting in high false-positive rates. To address this issue, we prop… ▽ More

    Submitted 14 June, 2023; v1 submitted 26 October, 2021; originally announced October 2021.

    Journal ref: Future Internet 2023, 15(6), 214

  17. arXiv:2107.09258  [pdf, other

    cs.GT

    A Markov Game Model for AI-based Cyber Security Attack Mitigation

    Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

    Abstract: The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current cyber-defense systems encounter various challenges to defend against such new and emerging threats. Modeling AI-aided threats through game theory models can help the defender to select optimal strategies against the attacks and make wise de… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: 11 pages

  18. arXiv:2009.02030  [pdf, other

    cs.CR

    Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud

    Authors: Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard

    Abstract: Moving Target Defense (MTD) is a proactive security mechanism which changes the attack surface aiming to confuse attackers. Cloud computing leverages MTD techniques to enhance cloud security posture against cyber threats. While many MTD techniques have been applied to cloud computing, there has not been a joint evaluation of the effectiveness of MTD techniques with respect to security and economic… ▽ More

    Submitted 19 June, 2021; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: 16 pages

  19. arXiv:2009.01604  [pdf, other

    cs.CR

    Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud

    Authors: Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard

    Abstract: The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the cloud providers are responsible for the security of the cloud, there are still many security concerns due to inherently complex model the cloud providers operate on (e.g.,multi-tenancy). In addition, the enterprises whose services have migr… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Comments: 9 pages

  20. MSD-Kmeans: A Novel Algorithm for Efficient Detection of Global and Local Outliers

    Authors: Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Timothy McIntosh

    Abstract: Outlier detection is a technique in data mining that aims to detect unusual or unexpected records in the dataset. Existing outlier detection algorithms have different pros and cons and exhibit different sensitivity to noisy data such as extreme values. In this paper, we propose a novel cluster-based outlier detection algorithm named MSD-Kmeans that combines the statistical method of Mean and Stand… ▽ More

    Submitted 15 October, 2019; originally announced October 2019.

    Comments: 12 pages, 5 figures, 2 tables

  21. arXiv:1904.01758  [pdf, other

    cs.CR

    An Automated Security Analysis Framework and Implementation for Cloud

    Authors: Hootan Alavizadeh, Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz

    Abstract: Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate their services to the cloud to utilize the benefit of cloud computing such as eliminating the capital expense of their computing need. There are security vulnerabilities and threats in the cloud. Many researches have been proposed to analyze… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: 8 pages, 8 figures