Skip to main content

Showing 1–31 of 31 results for author: Bridges, R A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.09200  [pdf, other

    stat.ML cs.AI cs.CR cs.LG math.PR

    Are Normalizing Flows the Key to Unlocking the Exponential Mechanism? A Path through the Accuracy-Privacy Ceiling Constraining Differentially Private ML

    Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley

    Abstract: The state of the art and de facto standard for differentially private machine learning (ML) is differentially private stochastic gradient descent (DPSGD). Yet, the method is inherently wasteful. By adding noise to every gradient, it diminishes the overall privacy with every gradient step. Despite 15 years of fruitful research advancing the composition theorems, sub-sampling methods, and implementa… ▽ More

    Submitted 2 February, 2024; v1 submitted 15 November, 2023; originally announced November 2023.

  2. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  3. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  4. Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools

    Authors: Jeffrey A. Nichols, Kevin D. Spakes, Cory L. Watson, Robert A. Bridges

    Abstract: In this case study, we describe the design and assembly of a cyber security testbed at Oak Ridge National Laboratory in Oak Ridge, TN, USA. The range is designed to provide agile reconfigurations to facilitate a wide variety of experiments for evaluations of cyber security tools -- particularly those involving AI/ML. In particular, the testbed provides realistic test environments while permitting… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021

  5. arXiv:2201.02665  [pdf, other

    cs.CR cs.LG stat.AP

    Detecting CAN Masquerade Attacks with Signal Clustering Similarity

    Authors: Pablo Moriano, Robert A. Bridges, Michael D. Iannacone

    Abstract: Vehicular Controller Area Networks (CANs) are susceptible to cyber attacks of different levels of sophistication. Fabrication attacks are the easiest to administer -- an adversary simply sends (extra) frames on a CAN -- but also the easiest to detect because they disrupt frame frequency. To overcome time-based detection methods, adversaries must administer masquerade attacks by sending frames in l… ▽ More

    Submitted 11 March, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 8 pages, 5 figures, 3 tables

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022

  6. arXiv:2112.00100  [pdf, other

    cs.HC

    A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data

    Authors: Savannah Norem, Ashley E Rice, Samantha Erwin, Robert A Bridges, Sean Oesch, Brian Weber

    Abstract: Security operation centers (SOCs) all over the world are tasked with reacting to cybersecurity alerts ranging in severity. Security Orchestration, Automation, and Response (SOAR) tools streamline cybersecurity alert responses by SOC operators. SOAR tool adoption is expensive both in effort and finances. Hence, it is crucial to limit adoption to those most worthwhile; yet no research evaluating or… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  7. arXiv:2105.06545  [pdf

    cs.CR

    What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity

    Authors: Edmon Begoli, Robert A. Bridges, Sean Oesch, Kathryn E. Knight

    Abstract: Policy-mandated, rigorously administered scientific testing is needed to provide transparency into the efficacy of artificial intelligence-based (AI-based) cyber defense tools for consumers and to prioritize future research and development. In this article, we propose a model that is informed by our experience, urged forward by massive scale cyberattacks, and inspired by parallel developments in t… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  8. Time-Based CAN Intrusion Detection Benchmark

    Authors: Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

    Abstract: Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message injection attacks. These injections change the overall timing characteristics of messages on the bus, and thus, to detect these malicious messages, t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021

  9. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  10. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  11. arXiv:2006.05993  [pdf, other

    cs.OH eess.SP

    CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data

    Authors: Miki E. Verma, Robert A. Bridges, Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone

    Abstract: CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their mappings of CAN data to vehicle signals, and these definitions vary according to make, model, and year. Without these mappings, the wealth of real-time vehicle information hidden in the CAN packets is uninterpretable, impeding vehicle-re… ▽ More

    Submitted 22 June, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

  12. Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

    Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges

    Abstract: Security operation centers (SOCs) typically use a variety of tools to collect large volumes of host logs for detection and forensic of intrusions. Our experience, supported by recent user studies on SOC operators, indicates that operators spend ample time (e.g., hundreds of man-hours) on investigations into logs seeking adversarial actions. Similarly, reconfiguration of tools to adapt detectors fo… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.

    Comments: The 2nd International Conference on Science of Cyber Security - SciSec 2019; Springer's Lecture Notes in Computer Science (LNCS) series

  13. arXiv:1904.13386  [pdf, other

    stat.ML cs.LG

    Active Manifolds: A non-linear analogue to Active Subspaces

    Authors: Robert A. Bridges, Anthony D. Gruber, Christopher Felder, Miki Verma, Chelsey Hoff

    Abstract: We present an approach to analyze $C^1(\mathbb{R}^m)$ functions that addresses limitations present in the Active Subspaces (AS) method of Constantine et al.(2015; 2014). Under appropriate hypotheses, our Active Manifolds (AM) method identifies a 1-D curve in the domain (the active manifold) on which nearly all values of the unknown function are attained, and which can be exploited for approximatio… ▽ More

    Submitted 14 May, 2019; v1 submitted 30 April, 2019; originally announced April 2019.

  14. arXiv:1902.00053  [pdf, other

    cs.CR

    Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach

    Authors: Michael D. Iannacone, Robert A. Bridges

    Abstract: Metrics and frameworks to quantifiably assess security measures have arisen from needs of three distinct research communities - statistical measures from the intrusion detection and prevention literature, evaluation of cyber exercises, e.g.,red-team and capture-the-flag competitions, and economic analyses addressing cost-versus-security tradeoffs. In this paper we provide two primary contributions… ▽ More

    Submitted 24 October, 2019; v1 submitted 31 January, 2019; originally announced February 2019.

  15. arXiv:1812.11596  [pdf, other

    cs.CR

    Towards a CAN IDS based on a neural-network data field predictor

    Authors: Krzysztof Pawelec, Robert A. Bridges, Frank L. Combs

    Abstract: Modern vehicles contain a few controller area networks (CANs), which allow scores of on-board electronic control units (ECUs) to communicate messages critical to vehicle functions and driver safety. CAN provide a lightweight and reliable broadcast protocol but is bereft of security features. As evidenced by many recent research works, CAN exploits are possible both remotely and with direct access,… ▽ More

    Submitted 4 January, 2019; v1 submitted 30 December, 2018; originally announced December 2018.

  16. arXiv:1812.02867  [pdf, other

    cs.HC cs.CY

    How do information security workers use host data? A summary of interviews with security analysts

    Authors: Robert A. Bridges, Michael D. Iannacone, John R. Goodall, Justin M. Beaver

    Abstract: Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, access to actual security personnel, their data, and their problems are necessarily limited by security concerns and time constraints. To help bridge t… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: interviews with 13 security analysts about host data, tools, desires

  17. arXiv:1811.07897  [pdf, other

    cs.OH stat.AP

    ACTT: Automotive CAN Tokenization and Translation

    Authors: Miki E. Verma, Robert A. Bridges, Samuel C. Hollifield

    Abstract: Modern vehicles contain scores of Electrical Control Units (ECUs) that broadcast messages over a Controller Area Network (CAN). Vehicle manufacturers rely on security through obscurity by concealing their unique mapping of CAN messages to vehicle functions which differs for each make, model, year, and even trim. This poses a major obstacle for after-market modifications notably performance tuning… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: 5th Annual Conference on Computational Science & Computational Intelligence (CSCI'18)

  18. arXiv:1811.00591  [pdf, other

    stat.AP cs.CR

    Defining a Metric Space of Host Logs and Operational Use Cases

    Authors: Miki E. Verma, Robert A. Bridges

    Abstract: Host logs, in particular, Windows Event Logs, are a valuable source of information often collected by security operation centers (SOCs). The semi-structured nature of host logs inhibits automated analytics, and while manual analysis is common, the sheer volume makes manual inspection of all logs impossible. Although many powerful algorithms for analyzing time-series and sequential data exist, util… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

  19. arXiv:1808.10840  [pdf, ps, other

    cs.CR

    Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection

    Authors: Zachariah Tyree, Robert A. Bridges, Frank L. Combs, Michael R. Moore

    Abstract: Modern vehicles rely on scores of electronic control units (ECUs) broadcasting messages over a few controller area networks (CANs). Bereft of security features, in-vehicle CANs are exposed to cyber manipulation and multiple researches have proved viable, life-threatening cyber attacks. Complicating the issue, CAN messages lack a common mapping of functions to commands, so packets are observable bu… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

    Journal ref: Proceedings of IEEE Connected and Autonomous Vehicles Symposium, VTC 2018

  20. arXiv:1808.01267  [pdf, other

    cs.SI physics.soc-ph

    EGBTER: Capturing degree distribution, clustering coefficients, and community structure in a single random graph model

    Authors: Omar El-daghar, Erik Lundberg, Robert A. Bridges

    Abstract: Random graph models are important constructs for data analytic applications as well as pure mathematical developments, as they provide capabilities for network synthesis and principled analysis. Several models have been developed with the aim of faithfully preserving important graph metrics and substructures. With the goal of capturing degree distribution, clustering coefficient, and communities i… ▽ More

    Submitted 3 August, 2018; originally announced August 2018.

    Comments: graph model extending BTER and GBTER, ASONAM conference paper, 2 tables, multiple images

    Journal ref: IEEE/ACM ASONAM 2018, August 28-31, 2018, Barcelona, Spain

  21. arXiv:1805.09676  [pdf, other

    cs.CR cs.AI cs.HC

    Forming IDEAS Interactive Data Exploration & Analysis System

    Authors: Robert A. Bridges, Maria A. Vincent, Kelly M. T. Huffer, John R. Goodall, Jessie D. Jamieson, Zachary Burch

    Abstract: Modern cyber security operations collect an enormous amount of logging and alerting data. While analysts have the ability to query and compute simple statistics and plots from their data, current analytical tools are too simple to admit deep understanding. To detect advanced and novel attacks, analysts turn to manual investigations. While commonplace, current investigations are time-consuming, int… ▽ More

    Submitted 20 June, 2018; v1 submitted 24 May, 2018; originally announced May 2018.

    Comments: 4 page short paper on IDEAS System, 4 figures

    Journal ref: Workshop on Information Security Workers, USENIX SOUPS 2018

  22. arXiv:1805.06070  [pdf, ps, other

    cs.CR

    A Survey of Intrusion Detection Systems Leveraging Host Data

    Authors: Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian, Chen, Robert A. Bridges

    Abstract: This survey focuses on intrusion detection systems (IDS) that leverage host-based data sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is organized by the input data source, presenting targeted sub-surveys of HIDS research leveraging system logs, audit data, Windows Registry, file systems, and program analysis. While system calls are generally included in… ▽ More

    Submitted 16 May, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

  23. arXiv:1802.04178  [pdf, other

    cs.LG math.CA stat.ML

    Dimension Reduction Using Active Manifolds

    Authors: Robert A. Bridges, Chris Felder, Chelsey Hoff

    Abstract: Scientists and engineers rely on accurate mathematical models to quantify the objects of their studies, which are often high-dimensional. Unfortunately, high-dimensional models are inherently difficult, i.e. when observations are sparse or expensive to determine. One way to address this problem is to approximate the original model with fewer input dimensions. Our project goal was to recover a func… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

  24. arXiv:1710.09422  [pdf, other

    cs.CR cs.DS stat.AP

    Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors

    Authors: Robert A. Bridges, Jessie D. Jamieson, Joel W. Reed

    Abstract: Anomaly detection (AD) has garnered ample attention in security research, as such algorithms complement existing signature-based methods but promise detection of never-before-seen attacks. Cyber operations manage a high volume of heterogeneous log data; hence, AD in such operations involves multiple (e.g., per IP, per data type) ensembles of detectors modeling heterogeneous characteristics (e.g.,… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: 11 pages, 5 figures. Proceedings of IEEE Big Data Conference, 2017

  25. arXiv:1709.08753  [pdf, other

    cs.CR

    Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware

    Authors: Qian Chen, Robert A. Bridges

    Abstract: Ransomware, a class of self-propagating malware that uses encryption to hold the victims' data ransom, has emerged in recent years as one of the most dangerous cyber threats, with widespread damage; e.g., zero-day ransomware WannaCry has caused world-wide catastrophe, from knocking U.K. National Health Service hospitals offline to shutting down a Honda Motor Company in Japan[1]. Our close collabor… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

  26. arXiv:1705.01977  [pdf, other

    cs.CR

    Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study

    Authors: Jarilyn M. Hernández Jiménez, Jeffrey A. Nichols, Katerina Goseva-Popstojanova, Stacy Prowell, Robert A. Bridges

    Abstract: Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a general-purpose computer. The results of our experi… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

  27. arXiv:1602.01130  [pdf, other

    cs.CR stat.ML

    GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

    Authors: Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall

    Abstract: This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets -- small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of tr… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: 4 pages submitted to Cyber & Information Security Research Conference 2016, ACM

  28. arXiv:1504.04317  [pdf, ps, other

    cs.IR cs.CL cs.CR

    Towards a relation extraction framework for cyber-security concepts

    Authors: Corinne L. Jones, Robert A. Bridges, Kelly Huffer, John Goodall

    Abstract: In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security en… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 4 pages in Cyber & Information Security Research Conference 2015, ACM

    ACM Class: H.3.3

  29. arXiv:1410.4355  [pdf, other

    cs.SI cs.LG stat.ML

    Multi-Level Anomaly Detection on Time-Varying Graph Data

    Authors: Robert A. Bridges, John Collins, Erik M. Ferragut, Jason Laska, Blair D. Sullivan

    Abstract: This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models… ▽ More

    Submitted 20 April, 2015; v1 submitted 16 October, 2014; originally announced October 2014.

    Comments: 8 pages. Updated paper to address reviewer comments

  30. arXiv:1308.4941  [pdf, other

    cs.IR cs.CL

    Automatic Labeling for Entity Extraction in Cyber Security

    Authors: Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall

    Abstract: Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often no… ▽ More

    Submitted 9 June, 2014; v1 submitted 22 August, 2013; originally announced August 2013.

    Comments: 10 pages

  31. arXiv:1308.4648  [pdf, other

    cs.IR cs.CL

    PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    Authors: Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall

    Abstract: Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources months before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant en… ▽ More

    Submitted 11 October, 2013; v1 submitted 21 August, 2013; originally announced August 2013.

    Comments: 6 pages, 3 figures, ieeeTran conference. International Conference on Machine Learning and Applications 2013

    MSC Class: IEEE