Skip to main content

Showing 1–5 of 5 results for author: MacVittie, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.02388  [pdf

    cs.LG

    A Survey of Machine Learning Algorithms for Detecting Malware in IoT Firmware

    Authors: Erik Larsen, Korey MacVittie, John Lilly

    Abstract: This work explores the use of machine learning techniques on an Internet-of-Things firmware dataset to detect malicious attempts to infect edge devices or subsequently corrupt an entire network. Firmware updates are uncommon in IoT devices; hence, they abound with vulnerabilities. Attacks against such devices can go unnoticed, and users can become a weak point in security. Malware can cause DDoS a… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 9 pages, 8 figures, 2 tables

  2. arXiv:2111.02378  [pdf

    cs.LG

    Intrusion Detection: Machine Learning Baseline Calculations for Image Classification

    Authors: Erik Larsen, Korey MacVittie, John Lilly

    Abstract: Cyber security can be enhanced through application of machine learning by recasting network attack data into an image format, then applying supervised computer vision and other machine learning techniques to detect malicious specimens. Exploratory data analysis reveals little correlation and few distinguishing characteristics between the ten classes of malware used in this study. A general model c… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 10 pages, 9 figures, 3 tables

  3. arXiv:2111.02375  [pdf

    cs.LG

    Virus-MNIST: Machine Learning Baseline Calculations for Image Classification

    Authors: Erik Larsen, Korey MacVittie, John Lilly

    Abstract: The Virus-MNIST data set is a collection of thumbnail images that is similar in style to the ubiquitous MNIST hand-written digits. These, however, are cast by resha** possible malware code into an image array. Naturally, it is poised to take on a role in benchmarking progress of virus classifier model training. Ten types are present: nine classified as malware and one benign. Cursory examination… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 11 pages, 13 figures, 2 tables

  4. arXiv:2110.07636  [pdf

    cs.LG cs.CR

    A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

    Authors: Erik Larsen, David Noever, Korey MacVittie

    Abstract: A survey of machine learning techniques trained to detect ransomware is presented. This work builds upon the efforts of Taylor et al. in using sensor-based methods that utilize data collected from built-in instruments like CPU power and temperature monitors to identify encryption activity. Exploratory data analysis (EDA) shows the features most useful from this simulated data are clock speed, temp… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 9 pages, 8 figures, 3 tables

  5. arXiv:2107.00436  [pdf

    cs.CV cs.AI cs.LG

    Overhead-MNIST: Machine Learning Baselines for Image Classification

    Authors: Erik Larsen, David Noever, Korey MacVittie, John Lilly

    Abstract: Twenty-three machine learning algorithms were trained then scored to establish baseline comparison metrics and to select an image classification algorithm worthy of embedding into mission-critical satellite imaging systems. The Overhead-MNIST dataset is a collection of satellite images similar in style to the ubiquitous MNIST hand-written digits found in the machine learning literature. The CatBoo… ▽ More

    Submitted 19 October, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

    Comments: 6 pages; 8 figures, 2 tables