Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Anomaly Detection In The Molecular Structure Of Gallium Arsenide Using Convolutional Neural Networks, Timothy Roche *, Aihua W. Wood, Philip Cho *, Chancellor Johnstone Aug 2023

Anomaly Detection In The Molecular Structure Of Gallium Arsenide Using Convolutional Neural Networks, Timothy Roche *, Aihua W. Wood, Philip Cho *, Chancellor Johnstone

Faculty Publications

This paper concerns the development of a machine learning tool to detect anomalies in the molecular structure of Gallium Arsenide. We employ a combination of a CNN and a PCA reconstruction to create the model, using real images taken with an electron microscope in training and testing. The methodology developed allows for the creation of a defect detection model, without any labeled images of defects being required for training. The model performed well on all tests under the established assumptions, allowing for reliable anomaly detection. To the best of our knowledge, such methods are not currently available in the open …


Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt Mar 2022

Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt

Theses and Dissertations

Many physical systems control or monitor important applications without the capacity to monitor for malware using on-device resources. Thus, it becomes valuable to explore malware detection methods for these systems utilizing external or off-device resources. This research investigates the viability of employing EM SCA to determine whether a performed operation is normal or malicious. A Raspberry Pi 3 was set up as a simulated motor controller with code paths for a normal or malicious operation. While the normal path only calculated the motor speed before updating the motor, the malicious path added a line of code to modify the calculated …


Defect Detection In Atomic Resolution Transmission Electron Microscopy Images Using Machine Learning, Philip Cho, Aihua W. Wood, Krishnamurthy Mahalingam, Kurt Eyink May 2021

Defect Detection In Atomic Resolution Transmission Electron Microscopy Images Using Machine Learning, Philip Cho, Aihua W. Wood, Krishnamurthy Mahalingam, Kurt Eyink

Faculty Publications

Point defects play a fundamental role in the discovery of new materials due to their strong influence on material properties and behavior. At present, imaging techniques based on transmission electron microscopy (TEM) are widely employed for characterizing point defects in materials. However, current methods for defect detection predominantly involve visual inspection of TEM images, which is laborious and poses difficulties in materials where defect related contrast is weak or ambiguous. Recent efforts to develop machine learning methods for the detection of point defects in TEM images have focused on supervised methods that require labeled training data that is generated via …


Anomaly Detection And Encrypted Programming Forensics For Automation Controllers, Robert W. Mellish Mar 2021

Anomaly Detection And Encrypted Programming Forensics For Automation Controllers, Robert W. Mellish

Theses and Dissertations

Securing the critical infrastructure of the United States is of utmost importance in ensuring the security of the nation. To secure this complex system a structured approach such as the NIST Cybersecurity framework is used, but systems are only as secure as the sum of their parts. Understanding the capabilities of the individual devices, developing tools to help detect misoperations, and providing forensic evidence for incidence response are all essential to mitigating risk. This thesis examines the SEL-3505 RTAC to demonstrate the importance of existing security capabilities as well as creating new processes and tools to support the NIST Framework. …


Cyber Anomaly Detection: Using Tabulated Vectors And Embedded Analytics For Efficient Data Mining, Robert J. Gutierrez, Kenneth W. Bauer, Bradley C. Boehmke, Cade M. Saie, Trevor J. Bihl Aug 2018

Cyber Anomaly Detection: Using Tabulated Vectors And Embedded Analytics For Efficient Data Mining, Robert J. Gutierrez, Kenneth W. Bauer, Bradley C. Boehmke, Cade M. Saie, Trevor J. Bihl

Faculty Publications

Firewalls, especially at large organizations, process high velocity internet traffic and flag suspicious events and activities. Flagged events can be benign, such as misconfigured routers, or malignant, such as a hacker trying to gain access to a specific computer. Confounding this is that flagged events are not always obvious in their danger and the high velocity nature of the problem. Current work in firewall log analysis is manual intensive and involves manpower hours to find events to investigate. This is predominantly achieved by manually sorting firewall and intrusion detection/prevention system log data. This work aims to improve the ability of …


Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack Sep 2012

Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack

Theses and Dissertations

This research explores the benefits of using commonly-available graphics processing units (GPUs) to perform classification of network traffic using supervised machine learning algorithms. Two full factorial experiments are conducted using a NVIDIA GeForce GTX 280 graphics card. The goal of the first experiment is to create a baseline for the relative performance of the CPU and GPU implementations of artificial neural network (ANN) and support vector machine (SVM) detection methods under varying loads. The goal of the second experiment is to determine the optimal ensemble configuration for classifying processed packet payloads using the GPU anomaly detector. The GPU ANN achieves …


The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride Mar 2008

The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride

Faculty Publications

In security-related areas there is concern over novel “zero-day” attacks that penetrate system defenses and wreak havoc. The best methods for countering these threats are recognizing “nonself” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that appears similar to self could be missed. Given this situation, one could incorrectly assume that a preference for a tighter fit to self over generalizability is important for false positive reduction in this type of learning problem. This article confirms that in anomaly detection as in other forms of classification a tight fit, …


A Comparison Of Generalizability For Anomaly Detection, Gilbert L. Peterson, Robert F. Mills, Brent T. Mcbride, Wesley T. Allred Aug 2005

A Comparison Of Generalizability For Anomaly Detection, Gilbert L. Peterson, Robert F. Mills, Brent T. Mcbride, Wesley T. Allred

Faculty Publications

In security-related areas there is concern over the novel “zeroday” attack that penetrates system defenses and wreaks havoc. The best methods for countering these threats are recognizing “non-self” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that looks similar to self could be missed. Given this situation one could logically assume that a tighter fit to self rather than generalizability is important for false positive reduction in this type of learning problem. This article shows that a tight fit, although important, does not supersede having some model generality. This …