Skip to main content

Showing 1–6 of 6 results for author: Kakkar, A

Searching in archive cs. Search in all archives.
.
  1. Discovering Command and Control Channels Using Reinforcement Learning

    Authors: Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, A**syam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

    Abstract: Command and control (C2) paths for issuing commands to malware are sometimes the only indicators of its existence within networks. Identifying potential C2 channels is often a manually driven process that involves a deep understanding of cyber tradecraft. Efforts to improve discovery of these channels through using a reinforcement learning (RL) based approach that learns to automatically carry out… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: SoutheastCon 2023. IEEE, 2023

  2. arXiv:2310.03667  [pdf, other

    cs.CR

    Enhancing Exfiltration Path Analysis Using Reinforcement Learning

    Authors: Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen

    Abstract: Building on previous work using reinforcement learning (RL) focused on identification of exfiltration paths, this work expands the methodology to include protocol and payload considerations. The former approach to exfiltration path discovery, where reward and state are associated specifically with the determination of optimal paths, are presented with these additional realistic characteristics to… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  3. arXiv:2309.01487  [pdf, other

    cs.CV

    GenSelfDiff-HIS: Generative Self-Supervision Using Diffusion for Histopathological Image Segmentation

    Authors: Vishnuvardhan Purma, Suhas Srinath, Seshan Srirangarajan, Aanchal Kakkar, Prathosh A. P

    Abstract: Histopathological image segmentation is a laborious and time-intensive task, often requiring analysis from experienced pathologists for accurate examinations. To reduce this burden, supervised machine-learning approaches have been adopted using large-scale annotated datasets for histopathological image analysis. However, in several scenarios, the availability of large-scale annotated data is a bot… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  4. arXiv:2211.03027  [pdf, other

    cs.LG cs.CR cs.NI

    Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

    Authors: Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on develo** RL methods for path analysis within enterprise networks. This work focuses on building SDR where the routes focus on exploring the network services while… ▽ More

    Submitted 6 November, 2022; originally announced November 2022.

  5. arXiv:2208.13524  [pdf, other

    cs.CR cs.LG

    Lateral Movement Detection Using User Behavioral Analysis

    Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated det… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: Contains 5 figures

  6. arXiv:2201.12416  [pdf, other

    cs.CR cs.LG cs.NI

    Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

    Authors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

    Abstract: Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts w… ▽ More

    Submitted 25 April, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)