scholarly journals Efficient machine learning for attack detection

2020 ◽  
Vol 62 (5-6) ◽  
pp. 279-286
Author(s):  
Christian Wressnegger

AbstractDetecting and fending off attacks on computer systems is an enduring problem in computer security. In light of a plethora of different threats and the growing automation used by attackers, we are in urgent need of more advanced methods for attack detection. Manually crafting detection rules is by no means feasible at scale, and automatically generated signatures often lack context, such that they fall short in detecting slight variations of known threats.In the thesis “Efficient Machine Learning for Attack Detection” [35], we address the necessity of advanced attack detection. For the effective application of machine learning in this domain, a periodic retraining over time is crucial. We show that with the right data representation, efficient algorithms for mining substring statistics, and implementations based on probabilistic data structures, training the underlying model for establishing an higher degree of automation for defenses can be achieved in linear time.

First Monday ◽  
2021 ◽  
Author(s):  
Stefano Cresci ◽  
Marinella Petrocchi ◽  
Angelo Spognardi ◽  
Stefano Tognazzi

Social bots are automated accounts often involved in unethical or illegal activities. Academia has shown how these accounts evolve over time, becoming increasingly smart at hiding their true nature by disguising themselves as genuine accounts. If they evade, bots hunters adapt their solutions to find them: the cat and mouse game. Inspired by adversarial machine learning and computer security, we propose an adversarial and proactive approach to social bot detection, and we call scholars to arms, to shed light on this open and intriguing field of study.


1998 ◽  
Vol 8 ◽  
pp. 67-91 ◽  
Author(s):  
A. Moore ◽  
M. S. Lee

This paper introduces new algorithms and data structures for quick counting for machine learning datasets. We focus on the counting task of constructing contingency tables, but our approach is also applicable to counting the number of records in a dataset that match conjunctive queries. Subject to certain assumptions, the costs of these operations can be shown to be independent of the number of records in the dataset and loglinear in the number of non-zero entries in the contingency table. We provide a very sparse data structure, the ADtree, to minimize memory use. We provide analytical worst-case bounds for this structure for several models of data distribution. We empirically demonstrate that tractably-sized data structures can be produced for large real-world datasets by (a) using a sparse tree structure that never allocates memory for counts of zero, (b) never allocating memory for counts that can be deduced from other counts, and (c) not bothering to expand the tree fully near its leaves. We show how the ADtree can be used to accelerate Bayes net structure finding algorithms, rule learning algorithms, and feature selection algorithms, and we provide a number of empirical results comparing ADtree methods against traditional direct counting approaches. We also discuss the possible uses of ADtrees in other machine learning methods, and discuss the merits of ADtrees in comparison with alternative representations such as kd-trees, R-trees and Frequent Sets.


2020 ◽  
Vol 1 (1) ◽  
pp. 78-92
Author(s):  
Davide Berardi ◽  
Franco Callegati ◽  
Andrea Melis ◽  
Marco Prandini

Passwords should be easy to remember, yet expiration policies mandate their frequent change. Caught in the crossfire between these conflicting requirements, users often adopt creative methods to perform slight variations over time. While easily fooling the most basic checks for similarity, these schemes lead to a substantial decrease in actual security, because leaked passwords, albeit expired, can be effectively exploited as seeds for crackers. This work describes an approach based on Bloom Filters to detect password similarity, which can be used to discourage password reuse habits. The proposed scheme intrinsically obfuscates the stored passwords to protect them in case of database leaks, and can be tuned to be resistant to common cryptanalytic techniques, making it suitable for usage on exposed systems.


Author(s):  
Rohan Pandey ◽  
Vaibhav Gautam ◽  
Ridam Pal ◽  
Harsh Bandhey ◽  
Lovedeep Singh Dhingra ◽  
...  

BACKGROUND The COVID-19 pandemic has uncovered the potential of digital misinformation in shaping the health of nations. The deluge of unverified information that spreads faster than the epidemic itself is an unprecedented phenomenon that has put millions of lives in danger. Mitigating this ‘Infodemic’ requires strong health messaging systems that are engaging, vernacular, scalable, effective and continuously learn the new patterns of misinformation. OBJECTIVE We created WashKaro, a multi-pronged intervention for mitigating misinformation through conversational AI, machine translation and natural language processing. WashKaro provides the right information matched against WHO guidelines through AI, and delivers it in the right format in local languages. METHODS We theorize (i) an NLP based AI engine that could continuously incorporate user feedback to improve relevance of information, (ii) bite sized audio in the local language to improve penetrance in a country with skewed gender literacy ratios, and (iii) conversational but interactive AI engagement with users towards an increased health awareness in the community. RESULTS A total of 5026 people who downloaded the app during the study window, among those 1545 were active users. Our study shows that 3.4 times more females engaged with the App in Hindi as compared to males, the relevance of AI-filtered news content doubled within 45 days of continuous machine learning, and the prudence of integrated AI chatbot “Satya” increased thus proving the usefulness of an mHealth platform to mitigate health misinformation. CONCLUSIONS We conclude that a multi-pronged machine learning application delivering vernacular bite-sized audios and conversational AI is an effective approach to mitigate health misinformation. CLINICALTRIAL Not Applicable


2020 ◽  
pp. 1-9
Author(s):  
Daniel Bergé ◽  
Tyler A. Lesh ◽  
Jason Smucny ◽  
Cameron S. Carter

Abstract Background Previous research in resting-state functional magnetic resonance imaging (rs-fMRI) has shown a mixed pattern of disrupted thalamocortical connectivity in psychosis. The clinical meaning of these findings and their stability over time remains unclear. We aimed to study thalamocortical connectivity longitudinally over a 1-year period in participants with recent-onset psychosis. Methods To this purpose, 129 individuals with recent-onset psychosis and 87 controls were clinically evaluated and scanned using rs-fMRI. Among them, 43 patients and 40 controls were re-scanned and re-evaluated 12 months later. Functional connectivity between the thalamus and the rest of the brain was calculated using a seed to voxel approach, and then compared between groups and correlated with clinical features cross-sectionally and longitudinally. Results At baseline, participants with recent-onset psychosis showed increased connectivity (compared to controls) between the thalamus and somatosensory and temporal regions (k = 653, T = 5.712), as well as decreased connectivity between the thalamus and left cerebellum and right prefrontal cortex (PFC; k = 201, T = −4.700). Longitudinal analyses revealed increased connectivity over time in recent-onset psychosis (relative to controls) in the right middle frontal gyrus. Conclusions Our results support the concept of abnormal thalamic connectivity as a core feature in psychosis. In agreement with a non-degenerative model of illness in which functional changes occur early in development and do not deteriorate over time, no evidence of progressive deterioration of connectivity during early psychosis was observed. Indeed, regionally increased connectivity between thalamus and PFC was observed.


Sign in / Sign up

Export Citation Format

Share Document