Search Results for author: Edward Bowen

Found 14 papers, 1 papers with code

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

no code implementations14 Feb 2024 Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

Results on a typical network configuration show that the RL agent can automatically discover resilient C2 attack paths utilizing both Tor-based and conventional communication channels, while also bypassing network firewalls.

Reinforcement Learning (RL)

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

no code implementations4 Dec 2023 Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

Federated learning has created a decentralized method to train a machine learning model without needing direct access to client data.

Data Poisoning Federated Learning

A Simple yet Efficient Ensemble Approach for AI-generated Text Detection

no code implementations6 Nov 2023 Harika Abburi, Kalyani Roy, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

Experiments conducted on four benchmark datasets for generative text classification show performance improvements in the range of 0. 5 to 100\% compared to previous state-of-the-art approaches.

Language Modelling Large Language Model +5

A Closer Look at Bearing Fault Classification Approaches

no code implementations29 Sep 2023 Harika Abburi, Tanya Chaudhary, Haider Ilyas, Lakshmi Manne, Deepak Mittal, Don Williams, Derek Snaidauf, Edward Bowen, Balaji Veeramani

Rolling bearing fault diagnosis has garnered increased attention in recent years owing to its presence in rotating machinery across various industries, and an ever increasing demand for efficient operations.

Classification

Generative AI Text Classification using Ensemble LLM Approaches

no code implementations14 Sep 2023 Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

For the first task of distinguishing between AI and human generated text, our model ranked in fifth and thirteenth place (with macro $F1$ scores of 0. 733 and 0. 649) for English and Spanish texts, respectively.

Language Modelling text-classification +1

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

no code implementations6 Jun 2023 Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen

The increasing reliance on the internet has led to the proliferation of a diverse set of web-browsers and operating systems (OSs) capable of browsing the web.

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

no code implementations6 Nov 2022 Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR).

reinforcement-learning Reinforcement Learning (RL)

Zero Day Threat Detection Using Metric Learning Autoencoders

no code implementations1 Nov 2022 Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

The proliferation of zero-day threats (ZDTs) to companies' networks has been immensely costly and requires novel methods to scan traffic for malicious behavior at massive scale.

Metric Learning

Anomaly Detection via Federated Learning

no code implementations12 Oct 2022 Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani

Machine learning has helped advance the field of anomaly detection by incorporating classifiers and autoencoders to decipher between normal and anomalous behavior.

Anomaly Detection Federated Learning +1

Lateral Movement Detection Using User Behavioral Analysis

no code implementations29 Aug 2022 Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack.

Feature Engineering

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

no code implementations4 May 2022 Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

With this paper, the authors' overarching goal is to provide a novel architecture and training methodology for cyber anomaly detectors that can generalize to multiple IT networks with minimal to no retraining while still maintaining strong performance.

Novelty Detection

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

no code implementations28 Jan 2022 Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks.

reinforcement-learning Reinforcement Learning (RL)

Cannot find the paper you are looking for? You can Submit a new open access paper.