Search Results for author: Shanchieh Jay Yang

Found 8 papers, 2 papers with code

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

1 code implementation28 Aug 2023 Andrea Corsini, Shanchieh Jay Yang

Our findings suggest that existing detectors can identify a consistent portion of new malicious traffic, and that improved embedding spaces enhance detection.

Contrastive Learning Network Intrusion Detection

On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

no code implementations24 Jun 2023 Reza Fayyazi, Shanchieh Jay Yang

Meanwhile, advancements in AI have led to the increasing use of Natural Language Processing (NLP) algorithms to assist the various tasks in cyber operations.

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

no code implementations28 Dec 2022 Stephen Moskal, Shanchieh Jay Yang

With growing sophistication and volume of cyber attacks combined with complex network structures, it is becoming extremely difficult for security analysts to corroborate evidences to identify multistage campaigns on their network.

SAGE: Intrusion Alert-driven Attack Graph Extractor

1 code implementation6 Jul 2021 Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang

We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge.

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

no code implementations15 Jun 2021 Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese

Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS).

BIG-bench Machine Learning Network Intrusion Detection +1

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

no code implementations3 Aug 2019 Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang

Recreating cyber-attack alert data with a high level of fidelity is challenging due to the intricate interaction between features, non-homogeneity of alerts, and potential for rare yet critical samples.

Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences

no code implementations5 Sep 2018 Haitao Du, Shanchieh Jay Yang

A key element in defending computer networks is to recognize the types of cyber attacks based on the observed malicious activities.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.