Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yisroel Mirsky is active.

Publication


Featured researches published by Yisroel Mirsky.


pacific-asia conference on knowledge discovery and data mining | 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts

Yisroel Mirsky; Bracha Shapira; Lior Rokach; Yuval Elovici

The clustering of unbounded data-streams is a difficult problem since the observed instances cannot be stored for future clustering decisions. Moreover, the probability distribution of streams tends to change over time, making it challenging to differentiate between a concept-drift and an anomaly. Although many excellent data-stream clustering algorithms have been proposed in the past, they are not suitable for capturing the temporal contexts of an entity.


Pervasive and Mobile Computing | 2017

Anomaly detection for smartphone data streams

Yisroel Mirsky; Asaf Shabtai; Bracha Shapira; Yuval Elovici; Lior Rokach

Abstract Smartphones centralize a great deal of users’ private information and are thus a primary target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the private information stored in the smartphone without detection. In situations where explicit information is lacking, these attackers can still be detected in an automated way by analyzing data streams (continuously sampled information such as an application’s CPU consumption, accelerometer readings, etc.). When clustered, anomaly detection techniques may be applied to the data stream in order to detect attacks in progress. In this paper we utilize an algorithm called pcStream that is well suited for detecting clusters in real world data streams and propose extensions to the pcStream algorithm designed to detect point, contextual, and collective anomalies. We provide a comprehensive evaluation that addresses mobile security issues on a unique dataset collected from 30 volunteers over eight months. Our evaluations show that the pcStream extensions can be used to effectively detect data leakage (point anomalies) and malicious activities (contextual anomalies) associated with malicious applications. Moreover, the algorithm can be used to detect when a device is being used by an unauthorized user (collective anomaly) within approximately 30 s with 1 false positive every two days.


Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security | 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research

Yisroel Mirsky; Asaf Shabtai; Lior Rokach; Bracha Shapira; Yuval Elovici

In this paper we describe and share with the research community, a significant smartphone dataset obtained from an ongoing long-term data collection experiment. The dataset currently contains 10 billion data records from 30 users collected over a period of 1.6 years and an additional 20 users for 6 months (totaling 50 active users currently participating in the experiment). The experiment involves two smartphone agents: SherLock and Moriarty. SherLock collects a wide variety of software and sensor data at a high sample rate. Moriarty perpetrates various attacks on the user and logs its activities, thus providing labels for the SherLock dataset. The primary purpose of the dataset is to help security professionals and academic researchers in developing innovative methods of implicitly detecting malicious behavior in smartphones. Specifically, from data obtainable without superuser (root) privileges. To demonstrate possible uses of the dataset, we perform a basic malware analysis and evaluate a method of continuous user authentication.


international conference on user modeling adaptation and personalization | 2017

User Verification on Mobile Devices Using Sequences of Touch Gestures

Liron Ben Kimon; Yisroel Mirsky; Lior Rokach; Bracha Shapira

Smartphones have become ubiquitous in our daily lives; they are used for a wide range of tasks and store increasing amounts of personal data. To minimize risk and prevent misuse of this data by unauthorized users, access must be restricted to verified users. Current classification-based methods for gesture-based user verification only consider single gestures, and not sequences. In this paper, we present a method which utilizes information from sequences of touchscreen gestures, and the context in which the gestures were made. To evaluate our approach, we built an application which records all the necessary data from the device (touch and contextual sensors which do not consume significant battery life), and installed it on several Galaxy S4 smartphones. The smartphones were given to 20 volunteers to use as their personal phones for two-weeks. Using XGBoost on the collected data, we were able to classify between a legitimate user and the population of illegitimate users (imposters) with an average equal error rate (EER) of 4.78% and an average area under the curve (AUC) of 98.15%. Our method demonstrates that by considering sequences of gestures, as opposed to individual gestures, the accuracy of the verification process improves significantly.


ieee european symposium on security and privacy | 2017

9-1-1 DDoS: Attacks, Analysis and Mitigation

Mordechai Guri; Yisroel Mirsky; Yuval Elovici

The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. In this paper we show how attackers can exploit the cellular network protocols in order to launch an anonymized DDoS attack on 911. The current FCC regulations require that all emergency calls be immediately routed regardless of the callers identifiers (e.g., IMSI and IMEI). A rootkit placed within the baseband firmware of a mobile phone can mask and randomize all cellular identifiers, causing the device to have no genuine identification within the cellular network. Such anonymized phones can issue repeated emergency calls that cannot be blocked by the network or the emergency call centers, technically or legally. We explore the 911 infrastructure and discuss why it is susceptible to this kind of attack. We then implement different forms of the attack and test our implementation on a small cellular network. Finally, we simulate and analyze anonymous attacks on a model of current 911 infrastructure in order to measure the severity of their impact. We found that with less than 6K bots (or


pacific-asia conference on knowledge discovery and data mining | 2018

Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices.

Liron Ben Kimon; Yisroel Mirsky; Lior Rokach; Bracha Shapira

100K hardware), attackers can block emergency services in an entire state (e.g., North Carolina) for days. We believe that this paper will assist the respective organizations, lawmakers, and security professionals in understanding the scope of this issue in order to prevent possible 911-DDoS attacks in the future.


arXiv: Computers and Society | 2018

CIoTA: Collaborative IoT Anomaly Detection via Blockchain.

Tomer Golomb; Yisroel Mirsky; Yuval Elovici

Smartphones have become ubiquitous in our daily lives; they are used for a wide range of tasks and store increasing amounts of personal data. To minimize risk and prevent misuse of this data by unauthorized users, access must be restricted to verified users. Current classification-based methods for gesture-based user verification only consider single gestures, and not sequences. In this paper, we present a method which utilizes information from sequences of touchscreen gestures, and the context in which the gestures were made using only basic touch features. To evaluate our approach, we built an application which records all the necessary data from the device (touch and contextual sensors which do not consume significant battery life). Using XGBoost on the collected data, we were able to classify between a legitimate user and the population of illegitimate users (imposters) with an average equal error rate (EER) of 4.78% and an average area under the curve (AUC) of 98.15%. Our method demonstrates that by considering only basic touch features and utilizing sequences of gestures, as opposed to individual gestures, the accuracy of the verification process improves significantly.


Physical Communication | 2018

Machine learning methods for SIR prediction in cellular networks

Orit Rozenblit; Yoram Haddad; Yisroel Mirsky; Rina Azoulay

Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign behaviors. This approach is vulnerable to adversarial attacks since all observations are assumed to be benign while training the anomaly detection model. In this paper, we propose CIoTA, a lightweight framework that utilizes the blockchain concept to perform distributed and collaborative anomaly detection for devices with limited resources. CIoTA uses blockchain to incrementally update a trusted anomaly detection model via self-attestation and consensus among IoT devices. We evaluate CIoTA on our own distributed IoT simulation platform, which consists of 48 Raspberry Pis, to demonstrate CIoTAs ability to enhance the security of each device and the security of the network as a whole.


IEEE Pervasive Computing | 2018

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

Yair Meidan; Michael Bohadana; Yael Mathov; Yisroel Mirsky; Asaf Shabtai; Dominik Breitenbacher; Yuval Elovici

Abstract Accurate assessment of the wireless coverage of a station is considered a key feature in 5G networks. Determining the reception coverage of transmitters becomes a complicated problem when there are interfering transmitters, and it becomes increasingly more complicated when the transmission powers of those transmitters are not uniform. In this paper, we compare different Machine Learning techniques that can be used to predict the wireless coverage maps. We consider the following Machine Learning methods: (1) Radial Basis Network; a type of Artificial Neural Network which typically uses Gaussian kernels, (2) an Artificial Neural Network which uses a sigmoid function as an activator,(3) A Multi-Layer Perceptron with two hidden layers, and (4) the K-Nearest-Neighbors technique. We show how it is possible to train the Neural Networks to generate coverage maps based on samples and we check the accuracy level of the learning process on a test set, using these four different learning techniques. The conclusion of our experiments is that if the sample points are randomly located, the Radial Basis Network and the Multi-Layer Perceptron perform better than the other methods. Thus, these models can be considered promising candidates for learning coverage maps, and can be used for efficient spectrum management within the framework of 5G cellular networks.


international conference on information technology | 2015

Up-High to Down-Low: Applying Machine Learning to an Exploit Database

Yisroel Mirsky; Noam Gross; Asaf Shabtai

The proliferation of IoT devices that can be more easily compromised than desktop computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for new methods that detect attacks launched from compromised IoT devices and that differentiate between hours- and milliseconds-long IoT-based attacks. In this article, we propose a novel network-based anomaly detection method for the IoT called N-BaIoT that extracts behavior snapshots of the network and uses deep autoencoders to detect anomalous network traffic from compromised IoT devices. To evaluate our method, we infected nine commercial IoT devices in our lab with two widely known IoT-based botnets, Mirai and BASHLITE. The evaluation results demonstrated our proposed methods ability to accurately and instantly detect the attacks as they were being launched from the compromised IoT devices that were part of a botnet.

Collaboration


Dive into the Yisroel Mirsky's collaboration.

Top Co-Authors

Avatar

Yuval Elovici

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Asaf Shabtai

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Bracha Shapira

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Lior Rokach

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Mordechai Guri

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Yoram Haddad

Jerusalem College of Technology

View shared research outputs
Top Co-Authors

Avatar

Liron Ben Kimon

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Noam Gross

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Orit Rozenblit

Jerusalem College of Technology

View shared research outputs
Top Co-Authors

Avatar

Rina Azoulay

Jerusalem College of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge