Search Results for author: Mohit Sewak

Found 16 papers, 1 papers with code

Making Large Language Models Better Data Creators

1 code implementation31 Oct 2023 Dong-Ho Lee, Jay Pujara, Mohit Sewak, Ryen W. White, Sujay Kumar Jauhar

In our experiments we demonstrate that instruction-following LLMs are highly cost-effective data creators, and that models trained with these data exhibit performance better than those trained with human-labeled data (by up to 17. 5%) on out-of-distribution evaluation, while maintaining comparable performance on in-distribution tasks.

Instruction Following Prompt Engineering +1

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

no code implementations6 Jun 2022 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Different techniques and algorithms under deep reinforcement learning have shown great promise in applications ranging from games to industrial processes, where it is claimed to augment systems with general AI capabilities.

reinforcement-learning Reinforcement Learning (RL)

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

no code implementations23 Sep 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

The so generated data and simulations could be used to bolster the defenses of an IDS against an actual AI-based metamorphic attack from advanced malware and ransomware.

DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

no code implementations12 Sep 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

We also developed a system named DRoID that uses the DRo mechanism for enhancing the performance of an existing Malware Detection System that uses (low information features like the) Android implicit Intent(s) as the only features.

Deep Clustering Malware Detection

Identification of Significant Permissions for Efficient Android Malware Detection

no code implementations28 Feb 2021 Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak

In this paper, we performed a comprehensive feature analysis to identify the significant Android permissions and propose an efficient Android malware detection system using machine learning and deep neural network.

Android Malware Detection BIG-bench Machine Learning +1

DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

no code implementations1 Feb 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

With the inclusion of the DRLDO as a sub-component, an existing Intrusion Detection System could be augmented with defensive capabilities against 'zero-day' attacks from obfuscated and metamorphic variants of existing malware.

Intrusion Detection

Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

no code implementations27 Jan 2021 Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

Finally, we propose an adversarial defense strategy that reduces the average fooling rate by threefold to 15. 22% against a single policy attack, thereby increasing the robustness of the detection models i. e. the proposed model can effectively detect variants (metamorphic) of malware.

Adversarial Defense Android Malware Detection +5

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

no code implementations26 Dec 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

In the process, we also determine the relative importance of all the different hyper-parameters of an LSTM network as applied to malware detection using their op-code sequence representations.

Intrusion Detection Language Modelling +1

DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS

no code implementations16 Oct 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS.

reinforcement-learning Reinforcement Learning (RL)

DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture

no code implementations16 Oct 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

So far neither the feasibility of developing an Intrusion Detection System solely on implicit Intent has been explored, nor are any benchmarks available of a malware classifier that is based on implicit Intent alone.

Intrusion Detection

Malware Detection using Machine Learning and Deep Learning

no code implementations4 Apr 2019 Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak

Current state-of-the-art research shows that recently, researchers and anti-virus organizations started applying machine learning and deep learning methods for malware analysis and detection.

BIG-bench Machine Learning Malware Analysis +1

Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

no code implementations16 Sep 2018 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc.

BIG-bench Machine Learning General Classification +4

Cannot find the paper you are looking for? You can Submit a new open access paper.