Skip to main content

Showing 1–6 of 6 results for author: Sekar, R

Searching in archive cs. Search in all archives.
.
  1. Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection

    Authors: Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen

    Abstract: As cyber attacks grow increasingly sophisticated and stealthy, it becomes more imperative and challenging to detect intrusion from normal behaviors. Through fine-grained causality analysis, provenance-based intrusion detection systems (PIDS) demonstrated a promising capacity to distinguish benign and malicious behaviors, attracting widespread attention from both industry and academia. Among divers… ▽ More

    Submitted 19 September, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: Accepted to NDSS 2025. Camera-ready version with supplementary materials

  2. arXiv:2007.05278  [pdf, other

    cs.LG stat.ML

    Product age based demand forecast model for fashion retail

    Authors: Rajesh Kumar Vashishtha, Vibhati Burman, Rajan Kumar, Srividhya Sethuraman, Abhinaya R Sekar, Sharadha Ramanan

    Abstract: Fashion retailers require accurate demand forecasts for the next season, almost a year in advance, for demand management and supply chain planning purposes. Accurate forecasts are important to ensure retailers' profitability and to reduce environmental damage caused by disposal of unsold inventory. It is challenging because most products are new in a season and have short life cycles, huge sales v… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: Accepted in KDD 2020 workshop , AI for fashion supply chain. https://kddfashion2020.mybluemix.net/#accepted-list

  3. arXiv:2005.05960  [pdf, other

    cs.LG cs.AI cs.CV cs.NE cs.RO stat.ML

    Planning to Explore via Self-Supervised World Models

    Authors: Ramanan Sekar, Oleh Rybkin, Kostas Daniilidis, Pieter Abbeel, Danijar Hafner, Deepak Pathak

    Abstract: Reinforcement learning allows solving complex tasks, however, the learning tends to be task-specific and the sample efficiency remains a challenge. We present Plan2Explore, a self-supervised reinforcement learning agent that tackles both these challenges through a new approach to self-supervised exploration and fast adaptation to new tasks, which need not be known during exploration. During explor… ▽ More

    Submitted 30 June, 2020; v1 submitted 12 May, 2020; originally announced May 2020.

    Comments: Accepted at ICML 2020. Videos and code at https://ramanans1.github.io/plan2explore/

  4. arXiv:1810.01594  [pdf, other

    cs.CR

    HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows

    Authors: Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan

    Abstract: In this paper, we present HOLMES, a system that implements a new approach to the detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case studies of real-world APTs that highlight some common goals of APT actors. In a nutshell, HOLMES aims to produce a detection signal that indicates the presence of a coordinated set of activities that are part of an APT campaign. On… ▽ More

    Submitted 17 January, 2019; v1 submitted 3 October, 2018; originally announced October 2018.

    Comments: The final version of this paper will appear in the proceedings of the 40th IEEE Symposium on Security and Privacy in May 2019 (https://www.ieee-security.org/TC/SP2019/)

  5. arXiv:1801.02062  [pdf, other

    cs.CR

    SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

    Authors: Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan

    Abstract: We present an approach and system for real-time reconstruction of attack scenarios on an enterprise host. To meet the scalability and real-time needs of the problem, we develop a platform-neutral, main-memory based, dependency graph abstraction of audit-log data. We then present efficient, tag-based techniques for attack detection and reconstruction, including source identification and impact anal… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 26th USENIX Security Symposium (USENIX Security 2017)

  6. arXiv:1610.06936  [pdf, other

    cs.CR

    Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program

    Authors: Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott Stoller, V. N. Venkatakrishnan, Junao Wang

    Abstract: This report presents attack analysis results of the first adversarial engagement event stream for the first engagement of the DARPA TC program conducted in October 2016. The analysis was performed by Stony Brook University and University of Illinois at Chicago. The findings in this report are obtained without prior knowledge of the attacks conducted.

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: 29 pages, 19 figures, technical report