Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Erik M. Ferragut is active.

Publication


Featured researches published by Erik M. Ferragut.


Proceedings of the 10th Annual Cyber and Information Security Research Conference on | 2015

Developing an Ontology for Cyber Security Knowledge Graphs

Michael D. Iannacone; Shawn J. Bohn; Grant C. Nakamura; John Gerth; Kelly M. T. Huffer; Robert A. Bridges; Erik M. Ferragut; John R. Goodall

In this paper we describe an ontology developed for a cyber security knowledge graph database. This is intended to provide an organized schema that incorporates information from a large variety of structured and unstructured data sources, and includes all relevant concepts within the domain. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe areas for future work.


2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) | 2011

Modeling cyber conflicts using an extended Petri Net formalism

Anita N. Zakrzewska; Erik M. Ferragut

When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real-time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions.


international conference on machine learning and applications | 2012

Randomized Sampling for Large Data Applications of SVM

Erik M. Ferragut; Jason A. Laska

A trend in machine learning is the application of existing algorithms to ever-larger datasets. Support Vector Machines (SVM) have been shown to be very effective, but have been difficult to scale to large-data problems. Some approaches have sought to scale SVM training by approximating and parallelizing the underlying quadratic optimization problem. This paper pursues a different approach. Our algorithm, which we call Sampled SVM, uses an existing SVM training algorithm to create a new SVM training algorithm. It uses randomized data sampling to better extend SVMs to large data applications. Experiments on several datasets show that our method is faster than and comparably accurate to both the original SVM algorithm it is based on and the Cascade SVM, the leading data organization approach for SVMs in the literature. Further, we show that our approach is more amenable to parallelization than Cascade SVM.


international conference on machine learning and applications | 2012

A New, Principled Approach to Anomaly Detection

Erik M. Ferragut; Jason A. Laska; Robert A. Bridges

Intrusion detection is often described as having two main approaches: signature-based and anomaly-based. We argue that only unsupervised methods are suitable for detecting anomalies. However, there has been a tendency in the literature to conflate the notion of an anomaly with the notion of a malicious event. As a result, the methods used to discover anomalies have typically been ad hoc, making it nearly impossible to systematically compare between models or regulate the number of alerts. We propose a new, principled approach to anomaly detection that addresses the main shortcomings of ad hoc approaches. We provide both theoretical and cyber-specific examples to demonstrate the benefits of our more principled approach.


2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) | 2011

Automatic construction of anomaly detectors from graphical models

Erik M. Ferragut; David Darmon; Craig A. Shue; Stephen Kelley

Detection of rare or previously unseen attacks in cyber security presents a central challenge: how does one search for a sufficiently wide variety of types of anomalies and yet allow the process to scale to increasingly complex data? In particular, creating each anomaly detector manually and training each one separately presents untenable strains on both human and computer resources. In this paper we propose a systematic method for constructing a potentially very large number of complementary anomaly detectors from a single probabilistic model of the data. Only one model needs to be trained, but numerous detectors can then be implemented. This approach promises to scale better than manual methods to the complex heterogeneity of real-life data. As an example, we develop a Latent Dirichlet Allocation probability model of TCP connections entering Oak Ridge National Laboratory. We show that several detectors can be automatically constructed from the model and will provide anomaly detection at flow, sub-flow, and host (both server and client) levels. This demonstrates how the fundamental connection between anomaly detection and probabilistic modeling can be exploited to develop more robust operational solutions.


2013 6th International Symposium on Resilient Control Systems (ISRCS) | 2013

A mathematical framework for the analysis of cyber-resilient control systems

Alexander M. Melin; Erik M. Ferragut; Jason A. Laska; David Fugate; Roger A. Kisner

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security techniques to protect system networks. These techniques are primarily concerned with the prevention of unauthorized access and the protection of data integrity. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective thus motivating a need to develop control systems that will operate successfully during a cyber attack. Little research has focused on the design of control systems with closed-loop dynamics that are resilient to cyber-attack. An understanding of the types of modifications to the system and signals that could be employed by an attacker after they have gained access to the control system and the effects of these attacks on the behavior of the control systems can guide efforts to develop attack detection and mitigation strategies. To formulate this problem, consistent mathematical definitions of concepts within resilient control need to be established to enable a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and architecture. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to realtime control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.


visual analytics science and technology | 2012

situ: Situational understanding and discovery for cyber attacks

Lane Harrison; Jason A. Laska; Riley Spahn; Michael D. Iannacone; Evan P Downing; Erik M. Ferragut; John R. Goodall

Our entry into the VAST 2012 Mini Challenge 2 is a streaming visual analytic system that scores events based on anomalousness and maliciousness and presents each event to the user in a user-defined groupings in animated small-multiple views. The anomaly detection algorithm identifies low probability events, supporting awareness regarding atypical traffic patterns on the network. The maliciousness classifier incorporates both situated knowledge of an environment (policy and machine roles) and domain knowledge (encoded in the IDS alerts). We discuss the visualization design and classification techniques, as well as provide examples of timely detection from the challenge dataset.


2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) | 2011

Addressing the need for independence in the CSE model

Robert K. Abercrombie; Erik M. Ferragut; Frederick T. Sheldon; Michael R. Grimaila

Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.


advances in computing and communications | 2014

Finite energy and bounded attacks on control system sensor signals

Seddik M. Djouadi; Alexander M. Melin; Erik M. Ferragut; Jason A. Laska; Jin Dong

Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) from attacks has been in securing the networks using information security techniques. Effort has also been applied to increasing the protection and reliability of the control system against random hardware and software failures. However, the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop systems under optimal signal attacks are provided. Finally, an illustrative numerical example using a power generation network is provided together with distributed LQ controllers.


cyber security and information intelligence research workshop | 2013

Addressing the challenges of anomaly detection for cyber physical energy grid systems

Erik M. Ferragut; Jason A. Laska; Bogdan D. Czejdo; Alexander M. Melin

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Collaboration


Dive into the Erik M. Ferragut's collaboration.

Top Co-Authors

Avatar

Jason A. Laska

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Robert A. Bridges

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Bogdan D. Czejdo

Fayetteville State University

View shared research outputs
Top Co-Authors

Avatar

John R. Goodall

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Alexander M. Melin

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Michael D. Iannacone

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Blair D. Sullivan

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

John P. Collins

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Robert K. Abercrombie

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Craig A. Shue

Worcester Polytechnic Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge