Skip to main content

Showing 1–4 of 4 results for author: Woodbridge, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.00807  [pdf

    cs.LG

    Applied Federated Learning: Architectural Design for Robust and Efficient Learning in Privacy Aware Settings

    Authors: Branislav Stojkovic, Jonathan Woodbridge, Zhihan Fang, Jerry Cai, Andrey Petrov, Sathya Iyer, Daoyu Huang, Patrick Yau, Arvind Sastha Kumar, Hitesh Jawa, Anamita Guha

    Abstract: The classical machine learning paradigm requires the aggregation of user data in a central location where machine learning practitioners can preprocess data, calculate features, tune models and evaluate performance. The advantage of this approach includes leveraging high performance hardware (such as GPUs) and the ability of machine learning practitioners to do in depth data analysis to improve mo… ▽ More

    Submitted 7 June, 2022; v1 submitted 1 June, 2022; originally announced June 2022.

  2. arXiv:1805.09738  [pdf, other

    cs.CR

    Detecting Homoglyph Attacks with a Siamese Neural Network

    Authors: Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant

    Abstract: A homoglyph (name spoofing) attack is a common technique used by adversaries to obfuscate file and domain names. This technique creates process or domain names that are visually similar to legitimate and recognized names. For instance, an attacker may create malware with the name svch0st.exe so that in a visual inspection of running processes or a directory listing, the process or file name might… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

  3. arXiv:1611.00791  [pdf, other

    cs.CR cs.AI

    Predicting Domain Generation Algorithms with Long Short-Term Memory Networks

    Authors: Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant

    Abstract: Various families of malware use domain generation algorithms (DGAs) to generate a large number of pseudo-random domain names to connect to a command and control (C&C) server. In order to block DGA C&C traffic, security organizations must first discover the algorithm by reverse engineering malware samples, then generating a list of domains for a given seed. The domains are then either preregistered… ▽ More

    Submitted 2 November, 2016; originally announced November 2016.

  4. arXiv:1610.01969  [pdf, other

    cs.CR cs.AI

    DeepDGA: Adversarially-Tuned Domain Generation and Detection

    Authors: Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar

    Abstract: Many malware families utilize domain generation algorithms (DGAs) to establish command and control (C&C) connections. While there are many methods to pseudorandomly generate domains, we focus in this paper on detecting (and generating) domains on a per-domain basis which provides a simple and flexible means to detect known DGA families. Recent machine learning approaches to DGA detection have been… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.