Alert button
Picture for Christopher Redino

Christopher Redino

Alert button

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 14, 2024
Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

Viaarxiv icon

Discovering Command and Control Channels Using Reinforcement Learning

Add code
Bookmark button
Alert button
Jan 13, 2024
Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

Viaarxiv icon

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 04, 2023
Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

Viaarxiv icon

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Add code
Bookmark button
Alert button
Nov 06, 2022
Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

Figure 1 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 2 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 3 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 4 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Bookmark button
Alert button
Nov 01, 2022
Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

Figure 1 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 2 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 3 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 4 for Zero Day Threat Detection Using Metric Learning Autoencoders
Viaarxiv icon

Anomaly Detection via Federated Learning

Add code
Bookmark button
Alert button
Oct 12, 2022
Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani

Figure 1 for Anomaly Detection via Federated Learning
Figure 2 for Anomaly Detection via Federated Learning
Figure 3 for Anomaly Detection via Federated Learning
Figure 4 for Anomaly Detection via Federated Learning
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Bookmark button
Alert button
Aug 29, 2022
Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Add code
Bookmark button
Alert button
May 04, 2022
Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Figure 1 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 2 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 3 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 4 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Viaarxiv icon

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Add code
Bookmark button
Alert button
Jan 28, 2022
Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

Figure 1 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 2 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 3 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 4 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Viaarxiv icon

Crown Jewels Analysis using Reinforcement Learning with Attack Graphs

Add code
Bookmark button
Alert button
Aug 20, 2021
Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park

Figure 1 for Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Figure 2 for Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Figure 3 for Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Figure 4 for Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Viaarxiv icon