Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robert A. Bridges is active.

Publication


Featured researches published by Robert A. Bridges.


Proceedings of the 10th Annual Cyber and Information Security Research Conference on | 2015

Developing an Ontology for Cyber Security Knowledge Graphs

Michael D. Iannacone; Shawn J. Bohn; Grant C. Nakamura; John Gerth; Kelly M. T. Huffer; Robert A. Bridges; Erik M. Ferragut; John R. Goodall

In this paper we describe an ontology developed for a cyber security knowledge graph database. This is intended to provide an organized schema that incorporates information from a large variety of structured and unstructured data sources, and includes all relevant concepts within the domain. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe areas for future work.


international conference on machine learning and applications | 2012

A New, Principled Approach to Anomaly Detection

Erik M. Ferragut; Jason A. Laska; Robert A. Bridges

Intrusion detection is often described as having two main approaches: signature-based and anomaly-based. We argue that only unsupervised methods are suitable for detecting anomalies. However, there has been a tendency in the literature to conflate the notion of an anomaly with the notion of a malicious event. As a result, the methods used to discover anomalies have typically been ad hoc, making it nearly impossible to systematically compare between models or regulate the number of alerts. We propose a new, principled approach to anomaly detection that addresses the main shortcomings of ad hoc approaches. We provide both theoretical and cyber-specific examples to demonstrate the benefits of our more principled approach.


international conference on machine learning and applications | 2013

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts

Nikki C McNeil; Robert A. Bridges; Michael D. Iannacone; Bogdan D. Czejdo; Nicolas E Perez; John R. Goodall

Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.


arXiv: Cryptography and Security | 2016

GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

Christopher R. Harshaw; Robert A. Bridges; Michael D. Iannacone; Joel W. Reed; John R. Goodall

This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets---small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of traffic are identified, and furthermore, individual IPs experiencing abnormal behavior are singled-out. Initial testing of GraphPrints is performed on real network data with an implanted anomaly. Evaluation shows false positive rates bounded by 2.84% at the time-interval level, and 0.05% at the IP-level with 100% true positive rates at both.


ACM Computing Surveys | 2016

Understanding GPU Power: A Survey of Profiling, Modeling, and Simulation Methods

Robert A. Bridges; Neena Imam; Tiffany M. Mintz

Modern graphics processing units (GPUs) have complex architectures that admit exceptional performance and energy efficiency for high-throughput applications. Although GPUs consume large amounts of power, their use for high-throughput applications facilitate state-of-the-art energy efficiency and performance. Consequently, continued development relies on understanding their power consumption. This work is a survey of GPU power modeling and profiling methods with increased detail on noteworthy efforts. As direct measurement of GPU power is necessary for model evaluation and parameter initiation, internal and external power sensors are discussed. Hardware counters, which are low-level tallies of hardware events, share strong correlation to power use and performance. Statistical correlation between power and performance counters has yielded worthwhile GPU power models, yet the complexity inherent to GPU architectures presents new hurdles for power modeling. Developments and challenges of counter-based GPU power modeling are discussed. Often building on the counter-based models, research efforts for GPU power simulation, which make power predictions from input code and hardware knowledge, provide opportunities for optimization in programming or architectural design. Noteworthy strides in power simulations for GPUs are included along with their performance or functional simulator counterparts when appropriate. Last, possible directions for future research are discussed.


arXiv: Information Retrieval | 2015

Towards a Relation Extraction Framework for Cyber-Security Concepts

Corinne L. Jones; Robert A. Bridges; Kelly M. T. Huffer; John R. Goodall

In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.


Proceedings of the 12th Annual Conference on Cyber and Information Security Research | 2017

Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection

Michael R. Moore; Robert A. Bridges; Frank L. Combs; Michael S. Starr; Stacy J. Prowell

Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the controller area network (CAN) bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper provides the first such algorithm with experiments using three attacks in five (total) scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).


Social Network Analysis and Mining | 2016

A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization

Robert A. Bridges; John P. Collins; Erik M. Ferragut; Jason A. Laska; Blair D. Sullivan

This work presents a modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in streaming graph data. Our goal is to detect changes at multiple levels of granularity, thereby identifying specific nodes and subgraphs causing a graph to appear anomalously. In particular, the framework detects changes in community membership, density, and node degree in a sequence of graphs where these are relatively stable. In route to this end, we introduce a new graph model, a generalization of the BTER model of Seshadhri et al., by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. This technique provides insight into a graph’s structure and internal context that may shed light on a detected event. Additionally, this multi-scale analysis facilitates intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. To illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision >0.786.


Proceedings of the 9th Annual Cyber and Information Security Research Conference on | 2014

Integration of external data sources with cyber security data warehouse

Bogdan D. Czejdo; Michael D. Iannacone; Robert A. Bridges; Erik M. Ferragut; John R. Goodall

In this paper we discuss problems related to integration of external knowledge and data components with a cyber security data warehouse to improve situational understanding of enterprise networks. More specifically, network assessment and trend analysis can be enhanced by knowledge about most current vulnerabilities and external network events. The cyber security data warehouse can be modeled as a hierarchical graph of aggregations that captures data at multiple scales. Nodes of the graph, which are summarization tables, can be linked to external sources of information. We discuss problems related to timely information about vulnerabilities and how to integrate vulnerability ontology with cyber security network data.


Archive | 2013

DETECTION OF ANOMALOUS EVENTS

Erik M. Ferragut; Jason A. Laska; Robert A. Bridges

Collaboration


Dive into the Robert A. Bridges's collaboration.

Top Co-Authors

Avatar

John R. Goodall

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Erik M. Ferragut

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Michael D. Iannacone

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Stacy J. Prowell

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Jason A. Laska

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Kelly M. T. Huffer

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Blair D. Sullivan

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joel W. Reed

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

John P. Collins

Oak Ridge National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge