Skip to main content

Showing 1–7 of 7 results for author: Chhetri, M B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.18462  [pdf, ps, other

    cs.CR

    Adaptive alert prioritisation in security operations centres via learning to defer with human feedback

    Authors: Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cécile Paris

    Abstract: Alert prioritisation (AP) is crucial for security operations centres (SOCs) to manage the overwhelming volume of alerts and ensure timely detection and response to genuine threats, while minimising alert fatigue. Although predictive AI can process large alert volumes and identify known patterns, it struggles with novel and evolving scenarios that demand contextual understanding and nuanced judgeme… ▽ More

    Submitted 23 June, 2025; originally announced June 2025.

    Comments: No comment

    ACM Class: I.2

  2. arXiv:2506.09365  [pdf, ps, other

    cs.CR

    ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection)

    Authors: Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris

    Abstract: Modern Security Operations Centres (SOCs) integrate diverse tools, such as SIEM, IDS, and XDR systems, offering rich contextual data, including alert enrichments, flow features, and similar case histories. Yet, analysts must still manually determine which of these contextual cues are most relevant when validating specific alerts. We introduce ContextBuddy, an AI assistant that learns from analysts… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

    Comments: 27 pages, 33 figures, 7 tables, under review

  3. arXiv:2505.03179  [pdf, ps, other

    cs.CR

    Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity

    Authors: Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris

    Abstract: This study investigates whether large language models (LLMs) can function as intelligent collaborators to bridge expertise gaps in cybersecurity decision-making. We examine two representative tasks-phishing email detection and intrusion detection-that differ in data modality, cognitive complexity, and user familiarity. Through a controlled mixed-methods user study, n = 58 (phishing, n = 34; intrus… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

    Comments: 20 pages, 10 figures, 2 tables, under review

  4. Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models

    Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo

    Abstract: This work evaluates the performance of Cyber Threat Intelligence (CTI) extraction methods in identifying attack techniques from threat reports available on the web using the MITRE ATT&CK framework. We analyse four configurations utilising state-of-the-art tools, including the Threat Report ATT&CK Mapper (TRAM) and open-source Large Language Models (LLMs) such as Llama2. Our findings reveal signifi… ▽ More

    Submitted 5 May, 2025; originally announced May 2025.

    Comments: 5 pages, 2 figures 4 tables, accepted for publication at the Web Conference 2025 (WWW'25)

  5. arXiv:2401.14432  [pdf, other

    cs.HC cs.LG

    A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams

    Authors: Shahroz Tariq, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris

    Abstract: This paper introduces A2C, a multi-stage collaborative decision framework designed to enable robust decision-making within human-AI teams. Drawing inspiration from concepts such as rejection learning and learning to defer, A2C incorporates AI systems trained to recognise uncertainty in their decisions and defer to human experts when needed. Moreover, A2C caters to scenarios where even human expert… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  6. arXiv:2202.10320  [pdf, other

    cs.CV cs.CR cs.LG

    Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

    Authors: Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor

    Abstract: Biometric data, such as face images, are often associated with sensitive information (e.g medical, financial, personal government records). Hence, a data breach in a system storing such information can have devastating consequences. Deep learning is widely utilized for face recognition (FR); however, such models are vulnerable to backdoor attacks executed by malicious parties. Backdoor attacks cau… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: 15 pages

  7. arXiv:2010.07584  [pdf, other

    cs.DC

    Towards Self-Improving Hybrid Elasticity Control of Cloud-based Software Systems

    Authors: Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan, Anton V. Uzunov, Surya Nepal

    Abstract: Elasticity is a form of self-adaptivity in cloud-based software systems that is typically restricted to the infrastructure layer and realized through auto-scaling. However, both reactive and proactive forms of infrastructure auto-scaling have limitations, when used separately as well as together. To address these limitations, we propose an approach for self-improving hybrid elasticity control that… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: 10 pages, 12 figures