Skip to main content

Showing 1–6 of 6 results for author: Aghaei, E

  1. arXiv:2309.03040  [pdf, other

    cs.CR cs.LG

    Automated CVE Analysis for Threat Prioritization and Impact Prediction

    Authors: Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

    Abstract: The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions of publicly disclosed cybersecurity vulnerabilities, often lacking the essential attack semantic information required for comprehensive weakness characterization… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  2. arXiv:2309.02785  [pdf, ps, other

    cs.CR cs.LG

    CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

    Authors: Ehsan Aghaei, Ehab Al-Shaer

    Abstract: This paper addresses a critical challenge in cybersecurity: the gap between vulnerability information represented by Common Vulnerabilities and Exposures (CVEs) and the resulting cyberattack actions. CVEs provide insights into vulnerabilities, but often lack details on potential threat actions (tactics, techniques, and procedures, or TTPs) within the ATT&CK framework. This gap hinders accurate CVE… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  3. arXiv:2204.02685  [pdf, other

    cs.CL cs.AI cs.CR

    SecureBERT: A Domain-Specific Language Model for Cybersecurity

    Authors: Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

    Abstract: Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation. Increased connection and automation have revolutionized the world's economic and cultural infrastructures, while they have introduced risks in terms of cyber attacks. CTI is information that helps cybersecurity analysts make intelligent securi… ▽ More

    Submitted 20 October, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

    Comments: This is the initial draft of this work and it may contain errors and typos. The revised version has already been submitted to a venue

  4. ThreatZoom: CVE2CWE using Hierarchical Neural Network

    Authors: Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

    Abstract: The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities. One or more CVEs are grouped into the Common Weakness Enumeration (CWE) classes for the purpose of understanding the software or configuration flaws and potential impacts enabled by these vulnerabilities and identifying means to detect or prevent exploitation. As… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: This is accepted paper in EAI SecureComm 2020, 16th EAI International Conference on Security and Privacy in Communication Networks

    Journal ref: EAI SecureComm 2020, 16th EAI International Conference on Security and Privacy in Communication Networks

  5. arXiv:2004.09662  [pdf, other

    cs.CL cs.CR

    The Panacea Threat Intelligence and Active Defense Platform

    Authors: Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr

    Abstract: We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks. We deploy a pipeline of human language technology, including Ask and Framing Detection, Named Entity Recognition, Dialogue Engineering, and Stylometry. Panacea processes modern message formats through a plug-in architecture to accommodate innovative appro… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at STOC

  6. arXiv:1911.11284  [pdf

    cs.LG cs.CR stat.ML

    Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

    Authors: Ehsan Aghaei, Gursel Serpen

    Abstract: This paper proposes a methodology for host-based anomaly detection using a semi-supervised algorithm namely one-class classifier combined with a PCA-based feature extraction technique called Eigentraces on system call trace data. The one-class classification is based on generating a set of artificial data using a reference distribution and combining the target class probability function with artif… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.