Skip to main content

Showing 1–8 of 8 results for author: Weisman, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.16307  [pdf, other

    cs.CR math.DS

    Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

    Authors: Michael J. Weisman, Alexander Kott, Jason E. Ellis, Brian J. Murphy, Travis W. Parker, Sidney Smith, Joachim Vandekerckhove

    Abstract: Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our ca… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.04413, arXiv:2302.07941

  2. An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

    Authors: Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney Smith, Alexander Kott, Michael J. Weisman

    Abstract: The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Rese… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-860

  3. arXiv:2302.04982  [pdf, other

    cs.CR math.DS stat.AP

    Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience

    Authors: Michael J. Weisman, Alexander Kott, Joachim Vandekerckhove

    Abstract: We model a vehicle equipped with an autonomous cyber-defense system in addition to its inherent physical resilience features. When attacked, this ensemble of cyber-physical features (i.e., ``bonware'') strives to resist and recover from the performance degradation caused by the malware's attack. We model the underlying differential equations governing such attacks for piecewise linear characteriza… ▽ More

    Submitted 16 February, 2023; v1 submitted 9 February, 2023; originally announced February 2023.

    Comments: 6 pages, Invited Session on "Estimation and Learning in Stochastic Systems" for the 57th Annual Conference on Information Sciences and Systems. Co-sponsorship of Johns Hopkins University and the IEEE Information Theory Society

  4. Mathematical Modeling of Cyber Resilience

    Authors: Alexander Kott, Michael J. Weisman, Joachim Vandekerckhove

    Abstract: We identify quantitative characteristics of responses to cyber compromises that can be learned from repeatable, systematic experiments. We model a vehicle equipped with an autonomous cyber-defense system and which also has some inherent physical resilience features. When attacked by malware, this ensemble of cyber-physical features (i.e., "bonware") strives to resist and recover from the performan… ▽ More

    Submitted 27 February, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 7 pages, 2022 IEEE Military Communications Conference

  5. arXiv:2203.06694  [pdf, other

    cs.CR

    Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

    Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy

    Abstract: Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examp… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  6. arXiv:2105.08619  [pdf, other

    cs.CR cs.LG cs.LO

    On the Robustness of Domain Constraints

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly. However, it is unclear if adversarial examples represent realistic inputs in the modeled domains. Diverse domains such as networks and phishing have domain constraints-complex relationships between features that an adversary must satisfy for an attack to be realized (in addition to any adversa… ▽ More

    Submitted 7 November, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted to the 28th ACM Conference on Computer and Communications Security. Seoul, South Korea

  7. arXiv:2011.01183  [pdf, other

    cs.CR cs.LG

    Adversarial Examples in Constrained Domains

    Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

    Abstract: Machine learning algorithms have been shown to be vulnerable to adversarial manipulation through systematic modification of inputs (e.g., adversarial examples) in domains such as image recognition. Under the default threat model, the adversary exploits the unconstrained nature of images; each feature (pixel) is fully under control of the adversary. However, it is not clear how these attacks transl… ▽ More

    Submitted 9 September, 2022; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted to IOS Press Journal of Computer Security

  8. Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

    Authors: Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael Weisman, Frederica Nelson, Rachel Greenstadt

    Abstract: Program authorship attribution has implications for the privacy of programmers who wish to contribute code anonymously. While previous work has shown that complete files that are individually authored can be attributed, we show here for the first time that accounts belonging to open source contributors containing short, incomplete, and typically uncompilable fragments can also be effectively attri… ▽ More

    Submitted 25 July, 2019; v1 submitted 19 January, 2017; originally announced January 2017.

    Journal ref: Dauber, E., Caliskan, A., Harang, R., et al. (2019). Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proceedings on Privacy Enhancing Technologies, 2019(3), pp. 389-408