Skip to main content

Showing 1–10 of 10 results for author: Al-Shaer, E

  1. arXiv:2309.03040  [pdf, other

    cs.CR cs.LG

    Automated CVE Analysis for Threat Prioritization and Impact Prediction

    Authors: Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

    Abstract: The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions of publicly disclosed cybersecurity vulnerabilities, often lacking the essential attack semantic information required for comprehensive weakness characterization… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  2. arXiv:2309.02785  [pdf, ps, other

    cs.CR cs.LG

    CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

    Authors: Ehsan Aghaei, Ehab Al-Shaer

    Abstract: This paper addresses a critical challenge in cybersecurity: the gap between vulnerability information represented by Common Vulnerabilities and Exposures (CVEs) and the resulting cyberattack actions. CVEs provide insights into vulnerabilities, but often lack details on potential threat actions (tactics, techniques, and procedures, or TTPs) within the ATT&CK framework. This gap hinders accurate CVE… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  3. arXiv:2204.02685  [pdf, other

    cs.CL cs.AI cs.CR

    SecureBERT: A Domain-Specific Language Model for Cybersecurity

    Authors: Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

    Abstract: Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation. Increased connection and automation have revolutionized the world's economic and cultural infrastructures, while they have introduced risks in terms of cyber attacks. CTI is information that helps cybersecurity analysts make intelligent securi… ▽ More

    Submitted 20 October, 2022; v1 submitted 6 April, 2022; originally announced April 2022.

    Comments: This is the initial draft of this work and it may contain errors and typos. The revised version has already been submitted to a venue

  4. arXiv:2104.08994  [pdf, other

    cs.CR cs.AI cs.GT

    Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense

    Authors: Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee

    Abstract: With the increasing system complexity and attack sophistication, the necessity of autonomous cyber defense becomes vivid for cyber and cyber-physical systems (CPSs). Many existing frameworks in the current state-of-the-art either rely on static models with unrealistic assumptions, or fail to satisfy the system safety and security requirements. In this paper, we present a new hybrid autonomous agen… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: 11 pages

  5. arXiv:2102.11498  [pdf, other

    cs.LG cs.CR

    V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities

    Authors: Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer

    Abstract: Weaknesses in computer systems such as faults, bugs and errors in the architecture, design or implementation of software provide vulnerabilities that can be exploited by attackers to compromise the security of a system. Common Weakness Enumerations (CWE) are a hierarchically designed dictionary of software weaknesses that provide a means to understand software flaws, potential impact of their expl… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: Under submission to KDD 2021 Applied Data Science Track

  6. ThreatZoom: CVE2CWE using Hierarchical Neural Network

    Authors: Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

    Abstract: The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities. One or more CVEs are grouped into the Common Weakness Enumeration (CWE) classes for the purpose of understanding the software or configuration flaws and potential impacts enabled by these vulnerabilities and identifying means to detect or prevent exploitation. As… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: This is accepted paper in EAI SecureComm 2020, 16th EAI International Conference on Security and Privacy in Communication Networks

    Journal ref: EAI SecureComm 2020, 16th EAI International Conference on Security and Privacy in Communication Networks

  7. arXiv:2004.09662  [pdf, other

    cs.CL cs.CR

    The Panacea Threat Intelligence and Active Defense Platform

    Authors: Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr

    Abstract: We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks. We deploy a pipeline of human language technology, including Ask and Framing Detection, Named Entity Recognition, Dialogue Engineering, and Stylometry. Panacea processes modern message formats through a plug-in architecture to accommodate innovative appro… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Accepted at STOC

  8. arXiv:1907.00540  [pdf, other

    cs.LO cs.ET eess.SY

    A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips

    Authors: Mohammad Ashiqur Rahman, Md Hasan Shahriar, Ehab Al-Shaer, Quanyan Zhu

    Abstract: Plug-in Hybrid Electric Vehicles (PHEVs) are gaining popularity due to their economic efficiency as well as their contribution to green management. PHEVs allow the driver to use electric power exclusively for driving and then switch to gasoline as needed. The more gasoline a vehicle uses, the higher cost is required for the trip. However, a PHEV cannot last for a long period on stored electricity… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

    MSC Class: 68Q60

  9. arXiv:1812.03966  [pdf, other

    cs.CR cs.CY

    IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems

    Authors: Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant

    Abstract: Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shopping, and e-commerce. With its interoperable functionality, it is now possible to connect all domains of IoT together for providing competent services to the users. Because numerous IoT devices can connect and communicate at the same time, there can… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

  10. arXiv:1412.3359  [pdf, ps, other

    cs.CC cs.DS

    On DDoS Attack Related Minimum Cut Problems

    Authors: Qi Duan, Haadi Jafarian, Ehab Al-Shaer, Jinhui Xu

    Abstract: In this paper, we study two important extensions of the classical minimum cut problem, called {\em Connectivity Preserving Minimum Cut (CPMC)} problem and {\em Threshold Minimum Cut (TMC)} problem, which have important applications in large-scale DDoS attacks. In CPMC problem, a minimum cut is sought to separate a of source from a destination node and meanwhile preserve the connectivity between th… ▽ More

    Submitted 17 April, 2015; v1 submitted 10 December, 2014; originally announced December 2014.