Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (3)
- Computer Engineering (3)
- Computer Sciences (3)
- Information Security (3)
- Physical Sciences and Mathematics (3)
-
- Data Science (2)
- OS and Networks (2)
- Technology and Innovation (2)
- Applied Statistics (1)
- Artificial Intelligence and Robotics (1)
- Business Analytics (1)
- Business Intelligence (1)
- Computational Engineering (1)
- Digital Communications and Networking (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Other Computer Engineering (1)
- Robotics (1)
- Science and Technology Studies (1)
- Social and Behavioral Sciences (1)
- Statistical Models (1)
- Statistics and Probability (1)
- Systems Architecture (1)
- Systems Science (1)
- Theory and Algorithms (1)
- Keyword
-
- Cybersecurity (2)
- Anomaly detection (1)
- Approximate inference (1)
- Bayes (1)
- Bayesian (1)
-
- Bayesian Algorithms (1)
- Bayesian Neural Networks (1)
- Bitcoin (1)
- Blacklist (1)
- CAPA (1)
- Clustering (1)
- Cryptocurrency (1)
- Cyber (1)
- Data (1)
- Dynamic (1)
- Efficient ML training (1)
- End point (1)
- Enterprise (1)
- Explainable AI (1)
- Explainer (1)
- Families (1)
- Hdbscan (1)
- IOC (1)
- Indicators of compromise (1)
- Intrusion detection (1)
- Intrusion prevention (1)
- LIME Model (1)
- Malware (1)
- Model Interpretability (1)
- Network security (1)
Articles 1 - 6 of 6
Full-Text Articles in Risk Analysis
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
SMU Data Science Review
Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, Steven Bramhall, Hayley Horn, Michael Tieu, Nibhrat Lohia
Qlime-A Quadratic Local Interpretable Model-Agnostic Explanation Approach, Steven Bramhall, Hayley Horn, Michael Tieu, Nibhrat Lohia
SMU Data Science Review
In this paper, we introduce a proof of concept that addresses the assumption and limitation of linear local boundaries by Local Interpretable Model-Agnostic Explanations (LIME), a popular technique used to add interpretability and explainability to black box models. LIME is a versatile explainer capable of handling different types of data and models. At the local level, LIME creates a linear relationship for a given prediction through generated sample points to present feature importance. We redefine the linear relationships presented by LIME as quadratic relationships and expand its flexibility in non-linear cases and improve the accuracy of feature interpretations. We coin …
Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates
Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates
SMU Data Science Review
Network security systems are designed to identify and, if possible, prevent unauthorized access to computer and network resources. Today most network security systems consist of hardware and software components that work in conjunction with one another to present a layered line of defense against unauthorized intrusions. Software provides user interactive layers such as password authentication, and system level layers for monitoring network activity. This paper examines an application monitoring network traffic that attempts to identify Indicators of Compromise (IOC) by extracting patterns in the network traffic which likely corresponds to unauthorized access. Typical network log data and construct indicators are …
Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche
Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche
SMU Data Science Review
In this paper, we disambiguate risky activity corporate users are propagating with their software in real time by creating an enterprise security visualization solution for system administrators. The current problem in this domain is the lag in cyber intelligence that inhibits preventative security measure execution. This is partially due to the overemphasis of network activity, which is a nonfinite dataset and is difficult to comprehensively ingest with analytics. We address these concerns by elaborating on the beta of a software called "Insight" created by Felix Security. The overall solution leverages endpoint data along with preexisting whitelist/blacklist designations to unambiguously communicate …
Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard
Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard
SMU Data Science Review
Trust is paramount for the effective operation of any monetary system. While the distributed architecture of blockchain technology on which cryptocurrencies operate has many benefits, the anonymity of users on the blockchain has provided criminal users an opportunity to hide both their identities and illicit activities. In this paper, we present a scoring mechanism for cryptocurrency users where the scores represent users’ trustworthiness as safe or risky transactors in the cryptocurrency community. In order to distinguish law-abiding users from potential threats in the Bitcoin marketplace, we analyze historical thefts to profile transactions, classify them into risky and non-risky categories using …