Skip to main content

Showing 1–4 of 4 results for author: Swann, M

Searching in archive cs. Search in all archives.
.
  1. Tools for Network Traffic Generation -- A Quantitative Comparison

    Authors: Matthew Swann, Joseph Rose, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage

    Abstract: Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be produced by machines and devices on the network. Specifically for security applications, these tools can be used to consistently simulate malicious acti… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: 10 pages, 7 figures. World Congress on Internet Security (WorldCIS-2020)

  2. Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

    Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis

    Abstract: The rapid increase in the use of IoT devices brings many benefits to the digital society, ranging from improved efficiency to higher productivity. However, the limited resources and the open nature of these devices make them vulnerable to various cyber threats. A single compromised device can have an impact on the whole network and lead to major security and physical damages. This paper explores t… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: 11 pages, 4 figures, 2 tables

    Journal ref: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft)

  3. arXiv:2002.05646  [pdf, other

    cs.CY cs.CR cs.LG stat.ML

    Adversarial Machine Learning -- Industry Perspectives

    Authors: Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia

    Abstract: Based on interviews with 28 organizations, we found that industry practitioners are not equipped with tactical and strategic tools to protect, detect and respond to attacks on their Machine Learning (ML) systems. We leverage the insights from the interviews and we enumerate the gaps in perspective in securing machine learning systems when viewed in the context of traditional software security deve… ▽ More

    Submitted 19 March, 2021; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Minor Typos corrected 7 pages, 1 figure

  4. arXiv:1709.07095  [pdf, other

    cs.CR cs.AI

    Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

    Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann

    Abstract: Operationalizing machine learning based security detections is extremely challenging, especially in a continuously evolving cloud environment. Conventional anomaly detection does not produce satisfactory results for analysts that are investigating security incidents in the cloud. Model evaluation alone presents its own set of problems due to a lack of benchmark datasets. When deploying these detec… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

    Comments: 10 pages, 9 figures