no code implementations • 12 Dec 2023 • Jingdi Chen, Hanhan Zhou, Yongsheng Mei, Gina Adam, Nathaniel D. Bastian, Tian Lan
Many cybersecurity problems that require real-time decision-making based on temporal observations can be abstracted as a sequence modeling problem, e. g., network intrusion detection from a sequence of arriving packets.
no code implementations • 27 Nov 2023 • Jingdi Chen, Lei Zhang, Joseph Riem, Gina Adam, Nathaniel D. Bastian, Tian Lan
Deep Learning (DL) based methods have shown great promise in network intrusion detection by identifying malicious network traffic behavior patterns with high accuracy, but their applications to real-time, packet-level detections in high-speed communication networks are challenging due to the high computation time and resource requirements of Deep Neural Networks (DNNs), as well as lack of explainability.
no code implementations • 28 Sep 2023 • Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema
We posit that we can use the satisfiability modulo theory (SMT) solvers as deductive reasoning engines to analyze the generated solutions from the LLMs, produce counterexamples when the solutions are incorrect, and provide that feedback to the LLMs exploiting the dialog capability of instruct-trained LLMs.
no code implementations • 14 Sep 2023 • Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian
The widespread integration of Internet of Things (IoT) devices across all facets of life has ushered in an era of interconnectedness, creating new avenues for cybersecurity challenges and underscoring the need for robust intrusion detection systems.
no code implementations • 18 May 2023 • Soumyadeep Hore, Jalal Ghadermazi, Diwas Paudel, Ankit Shah, Tapas K. Das, Nathaniel D. Bastian
The knowledge gained from our study on the adversary's ability to make specific evasive perturbations to different types of malicious packets can help defenders enhance the robustness of their NIDS against evolving adversarial attacks.
no code implementations • 25 Mar 2023 • Alexander M. Berenbeim, Iain J. Cruickshank, Susmit Jha, Robert H. Thomson, Nathaniel D. Bastian
Quantitative characterizations and estimations of uncertainty are of fundamental importance in optimization and decision-making processes.
1 code implementation • 24 Jan 2023 • Yash Chandak, Shiv Shankar, Nathaniel D. Bastian, Bruno Castro da Silva, Emma Brunskil, Philip S. Thomas
Methods for sequential decision-making are often built upon a foundational assumption that the underlying decision process is stationary.
no code implementations • 8 Nov 2022 • Zong-Zhi Lin, Thomas D. Pike, Mark M. Bailey, Nathaniel D. Bastian
Network intrusion detection systems (NIDS) to detect malicious attacks continue to meet challenges.
no code implementations • 3 Aug 2022 • Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian
The current approaches are deterministic and one-time decision-making methods, which do not consider future uncertainties when prioritizing and selecting vulnerabilities for mitigation.
no code implementations • 14 May 2021 • David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian
Inherent to the IoBT operating environment is the practice of adversarial machine learning, which attempts to circumvent machine learning models.
no code implementations • 24 Sep 2020 • Tyler J. Shipp, Daniel J. Clouse, Michael J. De Lucia, Metin B. Ahiskali, Kai Steverson, Jonathan M. Mullin, Nathaniel D. Bastian
Artificial intelligence (AI) and machine learning (ML) have become increasingly vital in the development of novel defense and intelligence capabilities across all domains of warfare.
no code implementations • 28 May 2020 • Marc Chalé, Nathaniel D. Bastian, Jeffery Weir
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
no code implementations • 23 Apr 2020 • Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian
Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to fool the model into producing an incorrect output.
no code implementations • 6 Jul 2019 • Sean M. Devine, Nathaniel D. Bastian
The use of machine learning and intelligent systems has become an established practice in the realm of malware detection and cyber threat prevention.
no code implementations • 1 Feb 2019 • Timothy J. Kiely, Nathaniel D. Bastian
Successfully predicting gentrification could have many social and commercial applications; however, real estate sales are difficult to predict because they belong to a chaotic system comprised of intrinsic and extrinsic characteristics, perceived value, and market speculation.