Skip to main content

Showing 1–3 of 3 results for author: Schiller, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.00441  [pdf, other

    cs.CR cs.AI cs.LG

    Zero Day Threat Detection Using Metric Learning Autoencoders

    Authors: Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

    Abstract: The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale. The diverse nature of normal behavior along with the huge landscape of attack types makes deep learning methods an attractive option for their ability to capture highly-nonlinear behavior patterns. In this paper, the autho… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 8 pages, accepted to ICMLA 2022

  2. arXiv:2210.06614  [pdf, other

    cs.LG cs.AI cs.CR

    Anomaly Detection via Federated Learning

    Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani

    Abstract: Machine learning has helped advance the field of anomaly detection by incorporating classifiers and autoencoders to decipher between normal and anomalous behavior. Additionally, federated learning has provided a way for a global model to be trained with multiple clients' data without requiring the client to directly share their data. This paper proposes a novel anomaly detector via federated learn… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

  3. arXiv:2205.02298  [pdf, other

    cs.CR cs.AI

    Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

    Authors: Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

    Abstract: Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been costing organizations millions of dollars to remediate. The increasing expansion of network attack surfaces and the exponentially growing number of ass… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 11 pages, 6 figures, submitting to NeurIPS 2022