no code implementations • 30 Dec 2023 • Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang
Tactics, Techniques, and Procedures (TTPs) outline the methods attackers use to exploit vulnerabilities.
1 code implementation • 28 Aug 2023 • Andrea Corsini, Shanchieh Jay Yang
Our findings suggest that existing detectors can identify a consistent portion of new malicious traffic, and that improved embedding spaces enhance detection.
no code implementations • 24 Jun 2023 • Reza Fayyazi, Shanchieh Jay Yang
Meanwhile, advancements in AI have led to the increasing use of Natural Language Processing (NLP) algorithms to assist the various tasks in cyber operations.
no code implementations • 28 Dec 2022 • Stephen Moskal, Shanchieh Jay Yang
With growing sophistication and volume of cyber attacks combined with complex network structures, it is becoming extremely difficult for security analysts to corroborate evidences to identify multistage campaigns on their network.
1 code implementation • 6 Jul 2021 • Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang
We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge.
no code implementations • 15 Jun 2021 • Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese
Recent advances in deep learning renewed the research interests in machine learning for Network Intrusion Detection Systems (NIDS).
no code implementations • 3 Aug 2019 • Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang
Recreating cyber-attack alert data with a high level of fidelity is challenging due to the intricate interaction between features, non-homogeneity of alerts, and potential for rare yet critical samples.
no code implementations • 5 Sep 2018 • Haitao Du, Shanchieh Jay Yang
A key element in defending computer networks is to recognize the types of cyber attacks based on the observed malicious activities.
Cryptography and Security