Skip to main content

Showing 1–5 of 5 results for author: Timmer, R C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04758  [pdf, other

    cs.CR cs.AI cs.CL

    Honeyfile Camouflage: Hiding Fake Files in Plain Sight

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Honeyfiles are a particularly useful type of honeypot: fake files deployed to detect and infer information from malicious behaviour. This paper considers the challenge of naming honeyfiles so they are camouflaged when placed amongst real files in a file system. Based on cosine distances in semantic vector spaces, we develop two metrics for filename camouflage: one based on simple averaging and one… ▽ More

    Submitted 10 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 3rd Workshop on the security implications of Deepfakes and Cheapfakes (WDC) co-located at ACM ASIACCS 2024

  2. arXiv:2303.10871  [pdf, other

    cs.IR cs.AI

    NASA Science Mission Directorate Knowledge Graph Discovery

    Authors: Roelien C. Timmer, Fech Scen Khoo, Megan Mark, Marcella Scoczynski Ribeiro Martins, Anamaria Berea, Gregory Renard, Kaylin Bugbee

    Abstract: The size of the National Aeronautics and Space Administration (NASA) Science Mission Directorate (SMD) is growing exponentially, allowing researchers to make discoveries. However, making discoveries is challenging and time-consuming due to the size of the data catalogs, and as many concepts and data are indirectly connected. This paper proposes a pipeline to generate knowledge graphs (KGs) represe… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

  3. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  4. arXiv:2203.07580  [pdf, other

    cs.CL cs.CR cs.LG

    TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

    Abstract: Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  5. arXiv:2203.06793  [pdf, other

    cs.CL

    Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Each and every organisation releases information in a variety of forms ranging from annual reports to legal proceedings. Such documents may contain sensitive information and releasing them openly may lead to the leakage of confidential information. Detection of sentences that contain sensitive information in documents can help organisations prevent the leakage of valuable confidential information.… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.