作者
Robert A Bridges, Brian Weber, Justin M Beaver, Jared M Smith, Miki E Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A Nichols, Brian Jewell, Michael D Iannacone, Chelsey Dunivan Stahl, Kelly MT Huffer, T Sean Oesch
发表日期
2023/12/15
研讨会论文
2023 IEEE International Conference on Big Data (BigData)
页码范围
1620-1629
出版商
IEEE
简介
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial I ntelligence Applications t o Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 100K files (50/50% benign/malicious) with a stratified distribution of file types, including ~1K zero-day program executables (increasing experiment size two orders of magnitude over previous work). We present an evaluation process of delivering a file to a fresh virtual machine donning the detection technology, waiting 90s to allow static detection, then executing the file and waiting another period for dynamic detection; this allows greater fidelity in the observational data than previous experiments, in particular …
学术搜索中的文章
RA Bridges, B Weber, JM Beaver, JM Smith, ME Verma… - 2023 IEEE International Conference on Big Data …, 2023