Match!
Kim-Kwang Raymond Choo
University of Texas at San Antonio
421Publications
46H-index
7,501Citations
Publications 427
Newest
Abstract Detecting unknown malware and their variants remains both an operational and a research challenge. In recent years, there have been attempts to design machine learning techniques to increase the success of existing automated malware detection and analysis. In this paper, we build a modified Two-hidden-layered Extreme Learning Machine (TELM), which uses the dependency of malware sequence elements in addition to having the advantage of avoiding backpropagation when training neural network...
Source
Abstract The use of bot malware and botnets as a tool to facilitate other malicious cyber activities (e.g. distributed denial of service attacks, dissemination of malware and spam, and click fraud). However, detection of botnets, particularly peer-to-peer (P2P) botnets, is challenging. Hence, in this paper we propose a sophisticated traffic reduction mechanism, integrated with a reinforcement learning technique. We then evaluate the proposed approach using real-world network traffic, and achieve...
Source
#1Abbas Yazdinejad (U of G: University of Guelph)
#2Reza M. Parizi (KSU: Kennesaw State University)H-Index: 9
Last.Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 46
view all 4 authors...
Abstract Security is one of the most challenging issues in software defined networking (SDN), and causes include the inability to detect the contents of the packets. In addition, file transferring to SDN is a potential attack vector that can be exploited at the network level. On the SDN data plane (i.e. the switch), packets are processed so that their behavior in the network can be determined. Packet parser (PP) acts as the main role of this operation on the switch. PP plays a very important rol...
Source
#1Amritraj Singh (KSU: Kennesaw State University)H-Index: 2
#2Reza M. Parizi (KSU: Kennesaw State University)H-Index: 9
Last.Ali Dehghantanha (U of G: University of Guelph)H-Index: 22
view all 5 authors...
Abstract Blockchain as a distributed computing platform enables users to deploy pieces of software (known as smart contracts) for a wealth of next-generation decentralized applications without involving a trusted third-party. The advantages of smart contracts do, however, come at a price. As with most technologies, there are potential security threats, vulnerabilities and various other issues associated with smart contracts. Writing secure and safe smart contracts can be extremely difficult due ...
Source
#1Amritraj Singh (KSU: Kennesaw State University)H-Index: 2
#2Kelly Click (KSU: Kennesaw State University)
Last.Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 46
view all 6 authors...
Abstract In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. In recent times, however, blockchain-based systems have faced stumbling blocks in the form of challenges related to scalability, privacy, security, etc. Several new methods have been proposed both by the research and professional communities to mitigat...
Source
#1Weiqi Dai (HUST: Huazhong University of Science and Technology)H-Index: 1
#2Chunkai Dai (HUST: Huazhong University of Science and Technology)H-Index: 1
Last.Hai Jin (HUST: Huazhong University of Science and Technology)H-Index: 49
view all 6 authors...
Data, a key asset in our data-driven economy, has fueled the emergence of a new data trading industry. However, there are a number of limitations in conventional data trading platforms due to the existence of dishonest buyer/data broker. To mitigate these limitations, we posit the importance of a data processing-as-a-service model, which complements the conventional data hosting/exchange-as-a-service model. Specifically, in this paper, we introduce a secure data trading ecosystem and present a n...
1 CitationsSource
Network log files from different sources often need to be analyzed in order to facilitate a more accurate assessment of the cyber threat severity. For example, using command line tools, any log file can be reviewed only in isolation. While using a log management system allows for searching across different log files, the relationship(s) between different network activities may not be easy to establish from the analysis of these different log files. We can use relational databases to establish th...
Source
The papers in this special section focus on Big Data applications in cybersecurity and threat intelligence. The last decade has witnessed a tremendous rapid increase in volume, veracity, velocity and variety of data (also commonly referred to as the four V’s of big data in the literature1) generated by different cyber security solutions and as part of cyber investigation cases. When a significant amount of data is collected from or generated by different devices and sources, intelligent big-data...
Source
Source
#1Soumya Banerjee (Jadavpur University)H-Index: 2
#2Vanga Odelu (BITS: Birla Institute of Technology and Science)H-Index: 18
Last.Kim-Kwang Raymond Choo (UTSA: University of Texas at San Antonio)H-Index: 46
view all 7 authors...
With the ever increasing adoption rate of Internet-enabled devices [also known as Internet of Things (IoT) devices] in applications such as smart home, smart city, smart grid, and healthcare applications, we need to ensure the security and privacy of data and communications among these IoT devices and the underlying infrastructure. For example, an adversary can easily tamper with the information transmitted over a public channel, in the sense of modification, deletion, and fabrication of data-in...
Source
12345678910