Skip to main content

Showing 1–5 of 5 results for author: Rhode, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.03814  [pdf, other

    cs.CR cs.LG

    Vulnerability Forecasting: In theory and practice

    Authors: Éireann Leverett, Matilda Rhode, Adam Wedgbury

    Abstract: Why wait for zero-days when you could predict them in advance? It is possible to predict the volume of CVEs released in the NVD as much as a year in advance. This can be done within 3 percent of the actual value, and different predictive algorithms perform well at different lookahead values. It is also possible to estimate the proportions of that total volumn belonging to specific vendors, softwar… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  2. arXiv:2004.05005  [pdf, other

    cs.LG cs.CR eess.SP stat.ML

    Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems

    Authors: Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury

    Abstract: The proliferation and application of machine learning based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS). However, the introduction of such IDSs has also created an additional attack vector; the learning models may also be subject to cyber attacks, otherwise referred to as Adversar… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: 9 pages. 7 figures. 7 tables. 46 references. Submitted to a special issue Journal of Information Security and Applications, Machine Learning Techniques for Cyber Security: Challenges and Future Trends, Elsevier

  3. arXiv:1902.02598  [pdf, other

    cs.CR

    Real-time malware process detection and automated process killing

    Authors: Matilda Rhode, Pete Burnap, Adam Wedgbury

    Abstract: Perimeter-based detection is no longer sufficient for mitigating the threat posed by malicious software. This is evident as antivirus (AV) products are replaced by endpoint detection and response (EDR) products, the latter allowing visibility into live machine activity rather than relying on the AV to filter out malicious artefacts. This paper argues that detecting malware in real-time on an endpo… ▽ More

    Submitted 12 January, 2022; v1 submitted 7 February, 2019; originally announced February 2019.

  4. arXiv:1711.07574  [pdf, other

    cs.HC

    Data Capture & Analysis to Assess Impact of Carbon Credit Schemes

    Authors: Matilda Rhode, Omer Rana, Tim Edwards

    Abstract: Data enables Non-Governmental Organisations (NGOs) to quantify the impact of their initiatives to themselves and to others. The increasing amount of data stored today can be seen as a direct consequence of the falling costs in obtaining it. Cheap data acquisition harnesses existing communications networks to collect information. Globally, more people are connected by the mobile phone network than… ▽ More

    Submitted 20 November, 2017; originally announced November 2017.

  5. Early Stage Malware Prediction Using Recurrent Neural Networks

    Authors: Matilda Rhode, Pete Burnap, Kevin Jones

    Abstract: Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to previously observed malicious code. However, static code analysis can be vulnerable to code obfuscation techniques. Behavioural data collected during file execution is more difficult to obfuscate, but takes a relatively lon… ▽ More

    Submitted 18 June, 2018; v1 submitted 11 August, 2017; originally announced August 2017.

    Journal ref: Computers & Security, Volume 77, August 2018, Pages 578-594