Filters








114 Hits in 2.9 sec

Detecting CAN Masquerade Attacks with Signal Clustering Similarity [article]

Pablo Moriano, Robert A. Bridges, Michael D. Iannacone
2022 arXiv   pre-print
., CAN-D [Controller Area Network Decoder]) and focus on advancing the state of the art for detecting masquerade attacks by analyzing time series extracted from raw CAN frames.  ...  d 4 8 a C I V 3 + Q N / + N 2 z Y H b X 0 w 8 H h v h p l 5 Y S K F Q d f 9 d g o b m 1 v b O 8 X d 0 t 7 + w e F R + f i k Z e J U M + 6 z W M a 6 E 1 L D p V D c R 4 G S d x L N a R R K 3 g 4 n t 3 O  ...  d 4 8 a C I V 3 + Q N / + N 2 z Y H b X 0 w 8 H h v h p l 5 Y S K F Q d f 9 d g o b m 1 v b O 8 X d 0 t 7 + w e F R + f i k Z e J U M + 6 z W M a 6 E 1 L D p V D c R 4 G S d x L N a R R K 3 g 4 n t 3 O  ... 
arXiv:2201.02665v1 fatcat:ntqldujf5fcx5jgjsxgvnimume

CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data [article]

Miki E. Verma, Robert A. Bridges, Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone
2021 arXiv   pre-print
CAN-D is the only solution with the potential to extract any CAN signal.  ...  CAN-D is implemented in lightweight hardware, allowing for an OBD-II plugin for real-time in-vehicle CAN decoding.  ...  D.  ... 
arXiv:2006.05993v2 fatcat:l5z3zkf7dvh3dbb7g4issz2d7y

How do information security workers use host data? A summary of interviews with security analysts [article]

Robert A. Bridges and Michael D. Iannacone and John R. Goodall and Justin M. Beaver
2018 arXiv   pre-print
Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, access to actual security personnel, their data, and their problems are necessarily limited by security concerns and time constraints. To help bridge the gap between researchers and security centers, this paper reports results of semi-structured
more » ... views of 13 professionals from five different SOCs including at least one large academic, research, and government organization. The interviews focused on the current practices and future desires of SOC operators about host-based data collection capabilities, what is learned from the data, what tools are used, and how tools are evaluated. Questions and the responses are organized and reported by topic. Then broader themes are discussed. Forest-level takeaways from the interviews center on problems stemming from size of data, correlation of heterogeneous but related data sources, signal-to-noise ratio of data, and analysts' time.
arXiv:1812.02867v1 fatcat:2jbgor3fgzcctkfv2nkhikugjm

A Survey of Intrusion Detection Systems Leveraging Host Data [article]

Tarrah R. Glass-Vanderlan and Michael D. Iannacone and Maria S. Vincent and Qian Chen and Robert A. Bridges
2018 arXiv   pre-print
PAD takes time O(v 2 d 2 ) and space O(vd 2 ) where v denotes the number of unique records, and d denotes number of record components (dimension).  ...  2 ) O(vd 2 ) Heller et al. '03 [62] OCSVMs O(dL 3 ) O(d(L + T )) Stolfo et al. '05 [152] OCSVMs O(dL 3 ) O(d(L + T )) Topallar et al. '04 [163] Table 6 : 6 File System Detection Systems  ... 
arXiv:1805.06070v2 fatcat:jrihtcjmhjgdbl4kkqmbgyiqs4

The RFamide receptor DMSR-1 regulates stress-induced sleep in C. elegans

Michael J Iannacone, Isabel Beets, Lindsey E Lopes, Matthew A Churgin, Christopher Fang-Yen, Matthew D Nelson, Liliane Schoofs, David M Raizen
2017 eLife  
Now, Iannacone et al. show that FLP-13 likely causes sleep by turning down activity in the cells in the nervous system that promote wakefulness.  ...  :SL2:dsRed; Pmyo-2:GFP; 1 kb DNA ladder] NQ1145: dmsr-1(qn45) V;qnIs303; qnEx610[Pttx-3:dmsr-1:SL2:dsRed; Pmyo-2:GFP; 1 kb DNA ladder]; NQ1147: dmsr-1(qn45) V; qnIs303; qnEx614 1 kb DNA ladder] Iannacone  ... 
doi:10.7554/elife.19837 pmid:28094002 pmcid:PMC5241116 fatcat:2dakw3i4xfggnnfeqkiki5244a

Automatic Labeling for Entity Extraction in Cyber Security [article]

Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall
2014 arXiv   pre-print
Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from
more » ... several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (∼750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.
arXiv:1308.4941v3 fatcat:mkfx6trjijhhnczxqwsx7a7xz4

Quantifiable Comparable Evaluations of Cyber Defensive Capabilities: A Survey Novel, Unified Approach [article]

Michael D. Iannacone, Robert A. Bridges
2019 arXiv   pre-print
Hence, the nal score is the normalized toxicity, T (a, s)/Z with Z (s) := ∫ OT (C −D)(s, t)dt . 39:10 Iannacone, Bridges, & Long 2.2.2 MIT-LL CTF's CIA Score. Werther et al.  ...  Weights W {c,i,a } allow exibility in this score. e o ensive score is O := fraction of ags captured from other teams' servers, and the total score is W d D + (1 − W d )O, with parameter W d ∈ (0, 1) encoding  ... 
arXiv:1902.00053v3 fatcat:wjtkadjct5gljgk32kjsricze4

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts [article]

Nikki McNeil, Robert A. Bridges, Michael D. Iannacone, Bogdan Czejdo, Nicolas Perez, John R. Goodall
2013 arXiv   pre-print
Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources months before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional
more » ... tstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.
arXiv:1308.4648v3 fatcat:lgpdn5biyjea5oyv55qlje6l5i

Case-Control Study of Cutaneous Human Papillomaviruses in Squamous Cell Carcinoma of the Skin

M. R. Iannacone, T. Gheit, T. Waterboer, A. R. Giuliano, J. L. Messina, N. A. Fenske, B. S. Cherpelis, V. K. Sondak, R. G. Roetzheim, K. M. Michael, M. Tommasino, M. Pawlita (+1 others)
2012 Cancer Epidemiology, Biomarkers and Prevention  
Iannacone et al.  ... 
doi:10.1158/1055-9965.epi-12-0032 pmid:22707711 pmcid:PMC4543310 fatcat:s6j5fzspvvdsvjn2aimxvtmw7q

Case-control Study of Merkel Cell Polyomavirus Infection and Cutaneous Squamous Cell Carcinoma

D. E. Rollison, A. R. Giuliano, J. L. Messina, N. A. Fenske, B. S. Cherpelis, V. K. Sondak, R. G. Roetzheim, M. R. Iannacone, K. M. Michael, T. Gheit, T. Waterboer, M. Tommasino (+1 others)
2011 Cancer Epidemiology, Biomarkers and Prevention  
Merkel cell polyomavirus (MCV) DNA has been reported in 0% to 25% of squamous cell carcinomas (SCC) occurring in immunocompetent individuals. We conducted the first serologic case-control study of MCV and SCC. Methods: Patients with histologically confirmed cutaneous SCC (n ¼ 173) were recruited from a university dermatology clinic. Controls were individuals who screened negative for and had no history of skin or other cancers (n ¼ 300). Levels of antibodies against capsid antigens for MCV and
more » ... nother polyomavirus, JC virus (JCV), were determined by fluorescent bead-based multiplex serology. Fresh-frozen tumor tissues were obtained from 145 SCC cases and tested for MCV DNA by multiplexed PCR. Associations between MCV seroreactivity and SCC were estimated by ORs and 95% CIs calculated using logistic regression with adjustment for age and sex. Results: MCV DNA was detected in SCC tumor tissues from 55 (38%) of 145 cases. A statistically significant association was observed between MCV seropositivity and MCV DNA-positive SCC (OR ¼ 2.49, 95% CI ¼ 1.03-6.04), with an almost four-fold association observed when comparing those with MCV antibodies in the fourth versus first quartiles (OR ¼ 3.93, 95% CI ¼ 1.43-10.76, P trend ¼ 0.01). No significant associations were observed between MCV seropositivity and MCV DNA-negative SCC (OR ¼ 1.38, 95% CI ¼ 0.76-2.48) or between JCV seropositivity and MCV DNA-positive or DNA-negative SCC. Conclusion: Past exposure to MCV may be a risk factor for SCC. Impact: Understanding the role of viral infections in the development of nonmelanoma skin cancer could lead to novel prevention strategies. Cancer Epidemiol Biomarkers Prev; 21(1); 74-81. Ó2011 AACR. a ORs and 95% CIs adjusted for age and sex. Rollison et al.
doi:10.1158/1055-9965.epi-11-0764 pmid:22016472 pmcid:PMC4543303 fatcat:hcc56zgjwvhrbavcuzd2ppcnf4

Interferon signaling suppresses the unfolded protein response and induces cell death in hepatocytes accumulating hepatitis B surface antigen

Ian Baudi, Masanori Isogawa, Federica Moalli, Masaya Onishi, Keigo Kawashima, Yuji Ishida, Chise Tateno, Yusuke Sato, Hideyoshi Harashima, Hiroyasu Ito, Tetsuya Ishikawa, Takaji Wakita (+3 others)
2021 PLoS Pathogens  
(D) A schematic diagram showing simplified unfolded response pathways.  ...  (D, E) IFNα suppresses chemically induced UPR in vitro. (D) Experimental schema showing how IFN signaling was triggered by treating WT PMHs with IFNα for 24 hours before addition of thapsigargin.  ... 
doi:10.1371/journal.ppat.1009228 pmid:33979382 fatcat:p7k7pqidkjd5hbubbki3ylwjoe

Sunlight Exposure and Cutaneous Human Papillomavirus Seroreactivity in Basal Cell and Squamous Cell Carcinomas of the Skin

M. R. Iannacone, W. Wang, H. G. Stockwell, K. O'Rourke, A. R. Giuliano, V. K. Sondak, J. L. Messina, R. G. Roetzheim, B. S. Cherpelis, N. A. Fenske, K. M. Michael, T. Waterboer (+2 others)
2012 Journal of Infectious Diseases  
Casabonne D, Michael KM, Waterboer T, Pawlita M, Forslund O, Burk RD, et al.  ...  Iannacone was born in New York in 1979.  ... 
doi:10.1093/infdis/jis374 pmid:22661119 pmcid:PMC4542577 fatcat:xsuj37cy7nbbjbpvwimakhq44y

Addressing the Lack of Comparability Testing in CAN Intrusion Detection Research: A Comprehensive Guide to CAN IDS Data Introduction of the ROAD Dataset [article]

Miki E. Verma and Michael D. Iannacone and Robert A. Bridges and Samuel C. Hollifield and Pablo Moriano and Bill Kay and Frank L. Combs
2022 arXiv   pre-print
We used CAN-D [30] to translate the signals and generate DBCs, using the heuristic signal boundary classifier (see Sec. III.A of the CAN-D paper) as it exhibited superior performance.  ...  III.D of the CAN-D paper) of the CAN-D pipeline requires matching translated signals to time series of an extra sensor (e.g., using on-board diagnostics) to linearly scale the extracted signals to appropriate  ... 
arXiv:2012.14600v2 fatcat:5mgl7xxtbngy5dgocrogcy3wgi

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection [article]

Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M.T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles (+3 others)
2022 arXiv   pre-print
statistical results on detection time and accuracy, consider complementary analysis (using multiple tools together), and provide two novel applications of the recent cost-benefit evaluation procedure of Iannacone  ...  y n a m i c ( N e t w o r k D y n a m i c 6 t t s s o o C 0 . 6 C 4 0 . 4 0 . 2 2 0 2 0 4 0 6 0 8 0 1 0 0 1 2 0 0 . 0 0 0 . 0 5 0 . 1 0 0 . 1 5 0 . 2 0 0 . 2 5 M $ ( K ) h a r d P e r c e n t Table 8  ...  We provide two novel contributions to the general cost model framework of Iannacone & Bridges [20] .  ... 
arXiv:2012.09214v4 fatcat:2fh36abohrcbtlew4rbvppjxsa

Acknowledgment of Ad Hoc Reviewers

Rozanne M. Sandri-Goldin
2018 Journal of Virology  
Iannacone, Matteo Ikegami, Tetsuro Ilyas, Muhammad Imler, Jean-Luc Imperiale, Michael J. Ishii, Ken Ishikawa, Masayuki Isogawa, Masanori Lafon, Monique Lagunoff, Michael Lai, Jonathan R.  ...  Duda, Robert Louis Duerkop, Breck Dunigan, David D. Durbin, Anna P. Dvorak, Cheryl Ebihara, Hideki Edlefsen, Paul T.  ... 
doi:10.1128/jvi.01692-18 fatcat:th6bbqedojbovjfn36hjx5ogay
« Previous Showing results 1 — 15 out of 114 results