AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SDM '21: April 29, 2021
Keynote and Invited Speakers
Prof. George Cybenko (SIAM Fellow), Dartmouth College
Dr. Jeffrey Johns, Director of Data Science, FireEye
Prof. Kevin Kornegay, Morgan State University
Accepted Oral Presentations
A Framework for Unsupervised Classification and Data Mining of Tweets about Cyber Vulnerabilities (Kenneth Alperin, Emily Joback, Leslie Shing and Gabe Elkin)
Evidential Cyber Threat Hunting (Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor and Jiyong Jang)
Collaborative Information Sharing for ML-Based Threat Detection (Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser and Jack Davidson)
Prospective Artificial Intelligence Approaches for Active Cyber Defence (Neil Dhir, Henrique Helfer Hoeltgebaum, Niall Adams, Mark Briers, Anthony Burke and Paul Jones)
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders (Prakhar Sharma, Phillip Porras, Steven Cheung, James Carpenter and Vinod Yegneswaran)
Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation (Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly and Nick Rutar)
Accepted Posters/Lightning Talks
Zoom Poster session:
https://mitll.zoomgov.com/j/1602006722?pwd=QnU1RU1iSFNWakMvemZkMnQ0SFZHQT09
Meeting ID: 160 200 6722
Passcode: 631828
One tap mobile
+16692545252,,1602006722#,,,,*631828# US (San Jose)
+16468287666,,1602006722#,,,,*631828# US (New York)
Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs (Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija and Aram Galstyan)
Predicting Adversary Lateral Movement Patterns with Deep Learning (Nathan Danneman, James Hyde)
On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware (Molly Buchanan, Jeffrey Collyer, Jack Davidson, Saikat Dey, Mark Gardner, Jason Hiser, Jeffry Lang, Alastair Nottingham and Alina Oprea)
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity (Frank W. Bentrem, Michael A. Corsello and Joshua J. Palm)
Robustness of ML-Enhanced IDS to Stealthy Adversaries (John Emanuello and Vance Wong)
Network Defense is Not a Game (Andres Molina-Markham, Ransom Winder and Ahmad Ridley)
Towards Causal Models for Adversary Distractions (Ronald Alford and Andy Applebaum)
Semi-Supervised Learning for Natural Language Processing on a Cybercrime Corpus (Courtney Falk)
Agenda
AI/ML for Cybersecurity Workshop -April 29, 2021
08:00 - 08:10 EDT Welcome and Opening Remarks: Dr. Una-May O’Reilly, MIT-CSAIL
08:10 - 08:15 EDT Session Introduction: Drs. Ahmad Ridley and John Emanuello, Laboratory for Advanced Cybersecurity Research
08:15 - 09:00 EDT Keynote: Formal Languages, Deep Learning, Topology, and Algebraic Word Problems Prof. George Cybenko, Dartmouth College
09:00 - 09:05 EDT Break
09:05 - 09:35 EDT Invited Talk: Applications of AI in Cybersecurity
Prof. Kevin Kornegay
09:35 - 10:50 EDT Submitted Talks Session (including a 15 min discussion with authors)
Prospective Artificial Intelligence Approaches for Active Cyber Defence;
Evidential Cyber Threat Hunting;
Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
10:50 - 11:25 EDT Lightning Talks for Posters
Crespi: Identifying botnet IP address clusters using natural language processing techniques of honeypot command logs
Hyde: Predicting Adversary Lateral Movement Patterns with Deep Learning
Hiser: On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware
Bentrem: Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity
Wong: Robustness of ML Enhanced IDS to Stealthy Adversaries
Molina: Network Defense Is Not A Game
Alford: Towards Causal Models for Adversary Distractions
Falk: Semi Supervised Learning for Natural Language Processing on a Cybercrime Corpus
11:25 - 12:15 EDT Government Perspectives Panel Discussion (50 Minutes)
Dr. Nathaniel Bastian, US Department of Defense Joint Artificial Intelligence Center
Dr. Sunny Fugate, Naval Information Warfare Center Pacific
Mr. Tejas Patel, Defense Advanced Research Projects Agency (DARPA)
Dr. Celeste Paul, US Department of Defense
12:15 - 13:00 EDT Break
13:00 - 13:15 EDT Discussion: Ms. Diane Staheli, MIT Lincoln Laboratory and Dr. Erik Hemberg, MIT-CSAIL
13:15 - 13:20 EDT Session Introduction: Dr. Kimberly Ferguson-Walter, Laboratory for Advanced Cybersecurity Research and Dr. Dennis Ross, MIT Lincoln Laboratory
13:20 - 14:05 EDT Keynote: Weak Supervision in Cybersecurity
Dr. Jeffrey Johns, FireEye
14:05 - 15:20 EDT Submitted Talks Session (including a 15 min discussion with authors)
Collaborative Information Sharing for ML-Based Threat Detection
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders;
A Framework for Unsupervised Classification and Data Mining of Tweets about Cyber Vulnerabilities
15:20 - 15:25 EDT Break
15:25 - 16:05 EDT Poster Session
16:10 - 17:00 EDT Academic/Industry Perspectives Panel Discussion
Dr. Jeffrey Johns, FireEye
Prof. Kevin Kornegay, Morgan State University
Dr. Nick Rutar, Perspecta Labs
Dr. Bronwyn Woods, Duo Security (part of Cisco)
17:00 - 17:15 EDT Discussion and Conclusion: Dr. Bill Streilein, MIT Lincoln Laboratory
Organizers
John Emanuello, Laboratory for Advanced Cybersecurity Research
Kimberly Ferguson-Walter, Laboratory for Advanced Cybersecurity Research
Erik Hemberg, Massachusetts Institute of Technology- CSAIL
Una-May O’Reilly, Massachusetts Institute of Technology- CSAIL
Ahmad Ridley, Laboratory for Advanced Cybersecurity Research
Dennis Ross, Massachusetts Institute of Technology- Lincoln Laboratory
Diane Staheli, Massachusetts Institute of Technology- Lincoln Laboratory
William Streilein, Massachusetts Institute of Technology- Lincoln Laboratory