Skip to main content

Showing 1–12 of 12 results for author: Moriano, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13778  [pdf, other

    cs.CR cs.LG

    Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN

    Authors: Pablo Moriano, Steven C. Hespeler, Mingyan Li, Robert A. Bridges

    Abstract: Vehicular controller area networks (CANs) are susceptible to masquerade attacks by malicious adversaries. In masquerade attacks, adversaries silence a targeted ID and then send malicious frames with forged content at the expected timing of benign frames. As masquerade attacks could seriously harm vehicle functionality and are the stealthiest attacks to detect in CAN, recent work has devoted attent… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 15 pages, 9 figures, 3 tables

  2. arXiv:2405.00636  [pdf, other

    physics.soc-ph cs.LG cs.SI physics.data-an

    Robustness of graph embedding methods for community detection

    Authors: Zhi-Feng Wei, Pablo Moriano, Ramakrishnan Kannan

    Abstract: This study investigates the robustness of graph embedding methods for community detection in the face of network perturbations, specifically edge deletions. Graph embedding techniques, which represent nodes as low-dimensional vectors, are widely used for various graph machine learning tasks due to their ability to capture structural properties of networks effectively. However, the impact of pertur… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 17 pages, 26 figures, 3 tables. Comments are welcome

  3. arXiv:2306.15588  [pdf

    cs.CR eess.SY

    Develo** and Deploying Security Applications for In-Vehicle Networks

    Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone

    Abstract: Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been e… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: 10 pages, PATRAM 22

  4. arXiv:2304.07238  [pdf, other

    physics.soc-ph cs.SI

    Robustness of community structure under edge addition

    Authors: Moyi Tian, Pablo Moriano

    Abstract: Communities often represent key structural and functional clusters in networks. To preserve such communities, it is important to understand their robustness under network perturbations. Previous work in community robustness analysis has focused on studying changes in the community structure as a response of edge rewiring and node or edge removal. However, the impact of increasing connectivity on t… ▽ More

    Submitted 1 November, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: 17 pages, 30 figures

    Journal ref: Phys. Rev. E 108 (2023) 054302

  5. CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level

    Authors: Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wen**g Lou, Y. Thomas Hou

    Abstract: Modern vehicles rely on a fleet of electronic control units (ECUs) connected through controller area network (CAN) buses for critical vehicular control. With the expansion of advanced connectivity features in automobiles and the elevated risks of internal system exposure, the CAN bus is increasingly prone to intrusions and injection attacks. As ordinary injection attacks disrupt the typical timing… ▽ More

    Submitted 7 October, 2023; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: 17 pages, 13 figures, A version of this paper is accepted by IEEE Internet of Things Journal

  6. arXiv:2201.02665  [pdf, other

    cs.CR cs.LG stat.AP

    Detecting CAN Masquerade Attacks with Signal Clustering Similarity

    Authors: Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

    Abstract: Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of different levels of sophistication. Fabrication attacks are the easiest to administer -- an adversary simply sends (extra) frames on a CAN -- but also the easiest to detect because they disrupt frame frequency. To overcome time-based detection methods, adversaries must administer masquerade attacks by sending frames in l… ▽ More

    Submitted 11 March, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 8 pages, 5 figures, 3 tables

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022

  7. arXiv:2110.05371  [pdf, other

    cs.SE cs.LG cs.SI stat.ML

    Graph-Based Machine Learning Improves Just-in-Time Defect Prediction

    Authors: Jonathan Bryan, Pablo Moriano

    Abstract: The increasing complexity of today's software requires the contribution of thousands of developers. This complex collaboration structure makes developers more likely to introduce defect-prone changes that lead to software faults. Determining when these defect-prone changes are introduced has proven challenging, and using traditional machine learning (ML) methods to make these determinations seems… ▽ More

    Submitted 14 April, 2023; v1 submitted 11 October, 2021; originally announced October 2021.

    Comments: 22 pages, 2 figures, 4 tables; references added; expanded results to match baseline conditions

    Journal ref: PLoS ONE 18(4): e0284077, 2023

  8. Time-Based CAN Intrusion Detection Benchmark

    Authors: Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

    Abstract: Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message injection attacks. These injections change the overall timing characteristics of messages on the bus, and thus, to detect these malicious messages, t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021

  9. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  10. arXiv:1905.05835  [pdf, other

    cs.NI stat.AP stat.ML

    Using Bursty Announcements for Detecting BGP Routing Anomalies

    Authors: Pablo Moriano, Raquel Hill, L. Jean Camp

    Abstract: Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination. Our research shows that BGP announcements that are associated with disruptive updates tend to occur in groups of relatively high frequency, followed by periods of infrequent activity. We hypothesize that we may use these bursty characterist… ▽ More

    Submitted 29 January, 2021; v1 submitted 14 May, 2019; originally announced May 2019.

    Comments: 16 pages, 13 figures, 4 table

    Journal ref: Comput. Netw. vol. 188, pp. 107835, 2021

  11. On the formation of structure in growing networks

    Authors: P. Moriano, J. Finke

    Abstract: Based on the formation of triad junctions, the proposed mechanism generates networks that exhibit extended rather than single power law behavior. Triad formation guarantees strong neighborhood clustering and community-level characteristics as the network size grows to infinity. The asymptotic behavior is of interest in the study of directed networks in which (i) the formation of links cannot be de… ▽ More

    Submitted 30 April, 2013; v1 submitted 17 January, 2013; originally announced January 2013.

    Comments: 17 pages, 9 figures, we apply the proposed mechanism to generate network realizations that resemble the degree distribution and clustering properties of an empirical network with no directed cycles (i.e., when the model parameter n=0), updated references

    MSC Class: 90B15; 91D30; 94C15

    Journal ref: Journal of Statistical Mechanics: Theory and Experiment 2013 (06), P06010

  12. arXiv:1110.0751  [pdf, ps, other

    physics.soc-ph cs.SI

    Power-law weighted networks from local attachments

    Authors: P. Moriano, J. Finke

    Abstract: This letter introduces a mechanism for constructing, through a process of distributed decision-making, substrates for the study of collective dynamics on extended power-law weighted networks with both a desired scaling exponent and a fixed clustering coefficient. The analytical results show that the connectivity distribution converges to the scaling behavior often found in social and engineering s… ▽ More

    Submitted 4 June, 2012; v1 submitted 4 October, 2011; originally announced October 2011.

    Comments: 18 pages, 3 figures; Proceedings of the IEEE Conference on Decision and Control and the European Control Conference, Orlando, FL, Dec. 2011; Added references; We modified the model in order to take into account extended power-law distributions which better fit to the citations data sets; Added proofs of theorems; Shorten version; Updated plot

    Journal ref: Europhysics Letters, vol. 99, no. 1, p. 18002, 2012