Search Results for author: Nathaniel D. Bastian

Found 15 papers, 1 papers with code

Real-time Network Intrusion Detection via Decision Transformers

no code implementations12 Dec 2023 Jingdi Chen, Hanhan Zhou, Yongsheng Mei, Gina Adam, Nathaniel D. Bastian, Tian Lan

Many cybersecurity problems that require real-time decision-making based on temporal observations can be abstracted as a sequence modeling problem, e. g., network intrusion detection from a sequence of arriving packets.

Decision Making Network Intrusion Detection +1

RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture

no code implementations27 Nov 2023 Jingdi Chen, Lei Zhang, Joseph Riem, Gina Adam, Nathaniel D. Bastian, Tian Lan

Deep Learning (DL) based methods have shown great promise in network intrusion detection by identifying malicious network traffic behavior patterns with high accuracy, but their applications to real-time, packet-level detections in high-speed communication networks are challenging due to the high computation time and resource requirements of Deep Neural Networks (DNNs), as well as lack of explainability.

Network Intrusion Detection

Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving

no code implementations28 Sep 2023 Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema

We posit that we can use the satisfiability modulo theory (SMT) solvers as deductive reasoning engines to analyze the generated solutions from the LLMs, produce counterexamples when the solutions are incorrect, and provide that feedback to the LLMs exploiting the dialog capability of instruct-trained LLMs.

Hallucination Question Answering +1

Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection

no code implementations14 Sep 2023 Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian

The widespread integration of Internet of Things (IoT) devices across all facets of life has ushered in an era of interconnectedness, creating new avenues for cybersecurity challenges and underscoring the need for robust intrusion detection systems.

Network Intrusion Detection Open Set Learning

Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation

no code implementations18 May 2023 Soumyadeep Hore, Jalal Ghadermazi, Diwas Paudel, Ankit Shah, Tapas K. Das, Nathaniel D. Bastian

The knowledge gained from our study on the adversary's ability to make specific evasive perturbations to different types of malicious packets can help defenders enhance the robustness of their NIDS against evolving adversarial attacks.

Network Intrusion Detection reinforcement-learning

Measuring Classification Decision Certainty and Doubt

no code implementations25 Mar 2023 Alexander M. Berenbeim, Iain J. Cruickshank, Susmit Jha, Robert H. Thomson, Nathaniel D. Bastian

Quantitative characterizations and estimations of uncertainty are of fundamental importance in optimization and decision-making processes.

Classification Decision Making

Off-Policy Evaluation for Action-Dependent Non-Stationary Environments

1 code implementation24 Jan 2023 Yash Chandak, Shiv Shankar, Nathaniel D. Bastian, Bruno Castro da Silva, Emma Brunskil, Philip S. Thomas

Methods for sequential decision-making are often built upon a foundational assumption that the underlying decision process is stationary.

counterfactual Counterfactual Reasoning +2

Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework

no code implementations3 Aug 2022 Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian

The current approaches are deterministic and one-time decision-making methods, which do not consider future uncertainties when prioritizing and selecting vulnerabilities for mitigation.

Decision Making Management +2

Cybersecurity Anomaly Detection in Adversarial Environments

no code implementations14 May 2021 David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian

Inherent to the IoBT operating environment is the practice of adversarial machine learning, which attempts to circumvent machine learning models.

Anomaly Detection BIG-bench Machine Learning +1

Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities

no code implementations24 Sep 2020 Tyler J. Shipp, Daniel J. Clouse, Michael J. De Lucia, Metin B. Ahiskali, Kai Steverson, Jonathan M. Mullin, Nathaniel D. Bastian

Artificial intelligence (AI) and machine learning (ML) have become increasingly vital in the development of novel defense and intelligence capabilities across all domains of warfare.

BIG-bench Machine Learning

Algorithm Selection Framework for Cyber Attack Detection

no code implementations28 May 2020 Marc Chalé, Nathaniel D. Bastian, Jeffery Weir

The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.

Cyber Attack Detection Meta-Learning

Adversarial Machine Learning in Network Intrusion Detection Systems

no code implementations23 Apr 2020 Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian

Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to fool the model into producing an incorrect output.

BIG-bench Machine Learning Network Intrusion Detection +3

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

no code implementations6 Jul 2019 Sean M. Devine, Nathaniel D. Bastian

The use of machine learning and intelligent systems has become an established practice in the realm of malware detection and cyber threat prevention.

BIG-bench Machine Learning Classification +2

The Spatially-Conscious Machine Learning Model

no code implementations1 Feb 2019 Timothy J. Kiely, Nathaniel D. Bastian

Successfully predicting gentrification could have many social and commercial applications; however, real estate sales are difficult to predict because they belong to a chaotic system comprised of intrinsic and extrinsic characteristics, perceived value, and market speculation.

BIG-bench Machine Learning Feature Engineering +2

Cannot find the paper you are looking for? You can Submit a new open access paper.