365 research outputs found

    HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models

    Get PDF
    We propose HoneyCode, an architecture for the generation of synthetic software repositories for cyber deception. The synthetic repositories have the characteristics of real software, including language features, file names and extensions, but contain no real intellectual property. The fake software can be used as a honeypot or form part of a deceptive environment. Existing approaches to software repository generation lack scalability due to reliance on hand-crafted structures for specific languages. Our approach is language agnostic and learns the underlying representations of repository structures, filenames and file content through a novel Tree Recurrent Network (TRN) and two recurrent networks (RNN) respectively. Each stage of the sequential generation process utilises features from prior steps, which increases the honey repository’s authenticity and consistency. Experiments show TRN generates tree samples that reduce degree mean maximal distance (MMD) by 90-92% and depth MMD by 75-86% to a held out test data set in comparison to recent deep graph generators and a baseline random tree generator. In addition, our RNN models generate convincing filenames with authentic syntax and realistic file content

    TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

    Get PDF
    Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files in the repository and semantic matching in an embedding vector space to compare honeyfile text and topic words robustly. We also present a honeyfile corpus created with different Natural Language Processing (NLP) methods. Experiments show that TSM is effective in inter-corpus comparisons and is a promising tool to measure the enticement of honeyfiles. TSM is the first measure to use NLP techniques to quantify the enticement of honeyfile content that compares the essential topical content of local contexts to honeyfiles and is robust to paraphrasing

    DualVAE: Controlling Colours of Generated and Real Images

    Full text link
    Colour controlled image generation and manipulation are of interest to artists and graphic designers. Vector Quantised Variational AutoEncoders (VQ-VAEs) with autoregressive (AR) prior are able to produce high quality images, but lack an explicit representation mechanism to control colour attributes. We introduce DualVAE, a hybrid representation model that provides such control by learning disentangled representations for colour and geometry. The geometry is represented by an image intensity mapping that identifies structural features. The disentangled representation is obtained by two novel mechanisms: (i) a dual branch architecture that separates image colour attributes from geometric attributes, and (ii) a new ELBO that trains the combined colour and geometry representations. DualVAE can control the colour of generated images, and recolour existing images by transferring the colour latent representation obtained from an exemplar image. We demonstrate that DualVAE generates images with FID nearly two times better than VQ-GAN on a diverse collection of datasets, including animated faces, logos and artistic landscapes

    Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

    Full text link
    Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves. However, despite being relatively cheap to deploy, the generation of realistic content at scale is very costly, due to the fact that rich, interactive deceptive technologies are largely hand-crafted. With recent improvements in Machine Learning, we now have the opportunity to bring scale and automation to the creation of realistic and enticing simulated content. In this work, we propose a framework to automate the generation of email and instant messaging-style group communications at scale. Such messaging platforms within organisations contain a lot of valuable information inside private communications and document attachments, making them an enticing target for an adversary. We address two key aspects of simulating this type of system: modelling when and with whom participants communicate, and generating topical, multi-party text to populate simulated conversation threads. We present the LogNormMix-Net Temporal Point Process as an approach to the first of these, building upon the intensity-free modeling approach of Shchur et al. to create a generative model for unicast and multi-cast communications. We demonstrate the use of fine-tuned, pre-trained language models to generate convincing multi-party conversation threads. A live email server is simulated by uniting our LogNormMix-Net TPP (to generate the communication timestamp, sender and recipients) with the language model, which generates the contents of the multi-party email threads. We evaluate the generated content with respect to a number of realism-based properties, that encourage a model to learn to generate content that will engage the attention of an adversary to achieve a deception outcome

    Prospectus, May 6, 1992

    Get PDF
    https://spark.parkland.edu/prospectus_1992/1013/thumbnail.jp

    Climate geoengineering: issues of path-dependence and socio-technical lock-in

    Get PDF
    As academic and policy interest in climate geoengineering grows, the potential irreversibility of technological developments in this domain has been raised as a pressing concern. The literature on socio-technical lock-in and path dependence is illuminating in helping to situate current concerns about climate geoengineering and irreversibility in the context of academic understandings of historical socio-technical development and persistence. This literature provides a wealth of material illustrating the pervasiveness of positive feedbacks of various types (from the discursive to the material) leading to complex socio-technical entanglements which may resist change and become inflexible even in the light of evidence of negative impacts. With regard to climate geoengineering, there are concerns that geoengineering technologies might contribute so-called ‘carbon lock-in’, or become irreversibly ‘locked-in’ themselves. In particular, the scale of infrastructures that geoengineering interventions would require, and the issue of the so-called ‘termination effect’ have been discussed in these terms. Despite the emergent and somewhat ill-defined nature of the field, some authors also suggest that the extant framings of geoengineering in academic and policy literatures may already demonstrate features recognizable as forms of cognitive lock-in, likely to have profound implications for future developments in this area. While the concepts of path-dependence and lock-in are the subject of ongoing academic critique, by drawing analytical attention to these pervasive processes of positive feedback and entanglement, this literature is highly relevant to current debates around geoengineering

    Resilience, Hardship and Social Conditions

    Get PDF
    This document is the Accepted Manuscript version of the following article: Hulya Dagdeviren, Matthew Donoghue, and Markus Promberger, ‘Resilience, Hardship and Social Conditions’, Journal of Social Policy, Vol. 45 (1), pp. 1-20, first published online 21 July 2015. The final, published version is available online at DOI: https://doi.org/10.1017/S004727941500032X © 2015 Cambridge University Press.This paper provides a critical assessment of the term ‘resilience’ – and its highly agent-centric conceptualisation – when applied to how individuals and households respond to hardship. We provide an argument for social conditions to be embedded into the framework of resilience analysis. Drawing on two different perspectives in social theory, namely the structure-agent nexus and path dependency, we aim to demonstrate that the concept of resilience, if understood in isolation from the social conditions within which it may or may not arise, can result in a number of problems. This includes misidentification of resilience, ideological exploitation of the term and inability to explain intermittence in resilience.Peer reviewedFinal Accepted Versio
    corecore