Victor Patriciu - Academia.edu (original) (raw)
Uploads
Papers by Victor Patriciu
2020 13th International Conference on Communications (COMM)
Tracking the evolution from the first DARPA set designed for IDS ML solutions, more than twenty y... more Tracking the evolution from the first DARPA set designed for IDS ML solutions, more than twenty years later, it can be noticed, that every time a new cybersecurity problem is discovered, unconsidered by previous solutions, a higher-level system is developed to solve it. Training on data specific to the defended system is more effective than training on publicly available datasets. This fact is arguable for the security solutions reviewed, but it is sure for solutions dedicated to incident response and forensics operations. This paper's objective is to design a machine learning-based schema for triage solutions used in quick incident response. More precisely, we evaluated the applicability of machine learning techniques for classifying unknown web access logs.
Education, Research and Business Technologies
In the time of huge information, there are a great deal of examination strategies and procedures ... more In the time of huge information, there are a great deal of examination strategies and procedures for analyzing large data sets and acquiring applicable outcomes that are proposed to be used for specific purposes in various ranges of business.In the virtual environments, many attacks are launched for obtaining advantages through information leakages from their targets. The motivation behind investigation techniques in digital security is to end up distinctly more adaptable with changes in adversary behaviors. Visual examination and prediction algorithms seem to contribute considerable a lot in resolving cyber security issues. Exploring large data sets, achieving knowledge, forensic investigation, are representing the most known cases in cyber security big data solutions.To get significant information from analytics, the most important steps to take before analyzing data are to normalize, eliminate duplicates and put it in a format that can enhance the proficiency of an algorithm. Nor...
2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4)
Keeping a rigorous focus on the lifecycle and evolution of data mining can prove difficult, espec... more Keeping a rigorous focus on the lifecycle and evolution of data mining can prove difficult, especially when dealing with devising a new machine learning mechanism or process. Access to the appropriate tooling and experimentation resources is instrumental for researchers operating in this domain. As data scientists, we all probably spent hours customizing a working environment at least once. We recognized that the tools, utilities, and techniques are more or so the same. Therefore, maintaining a custom environment while keeping all the software up-to-date can be a monotonous chore. This paper presents our take on developing a community workstation with artificial intelligence in mind. Dubbed ECLAIR, the framework includes a full portable laboratory for all kinds of data science processes, from data collection to analysis and insights delivery. With this distribution, end-users can apply statistical modeling to investigate and exploit various datasets. It also embeds everything needed by a developer to write his software for experimentation.
2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Journal of Military Technology
Informatica Economica, 2016
Threat information exchange is a critical part of any security system. Decisions regarding securi... more Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the "brownfiled" devices.
2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), 2014
2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY), 2016
2016 International Conference on Communications (COMM), 2016
2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2016
2016 International Conference on Communications (COMM), 2016
As the Internet grows at a phenomenal rate email systems has become a widely used electronic form... more As the Internet grows at a phenomenal rate email systems has become a widely used electronic form of communication. Everyday, a large number of people exchange messages in this fast and inexpensive way. With the excitement on electronic commerce growing, the usage of email will increase more exponential. In this paper we present our research in developing general method for intrusion detection in email system Internet-based. The main ideas are to use data mining techniques to discover consistent and useful patterns of email system that can recognize anomalies and known intrusions.
2020 13th International Conference on Communications (COMM)
Tracking the evolution from the first DARPA set designed for IDS ML solutions, more than twenty y... more Tracking the evolution from the first DARPA set designed for IDS ML solutions, more than twenty years later, it can be noticed, that every time a new cybersecurity problem is discovered, unconsidered by previous solutions, a higher-level system is developed to solve it. Training on data specific to the defended system is more effective than training on publicly available datasets. This fact is arguable for the security solutions reviewed, but it is sure for solutions dedicated to incident response and forensics operations. This paper's objective is to design a machine learning-based schema for triage solutions used in quick incident response. More precisely, we evaluated the applicability of machine learning techniques for classifying unknown web access logs.
Education, Research and Business Technologies
In the time of huge information, there are a great deal of examination strategies and procedures ... more In the time of huge information, there are a great deal of examination strategies and procedures for analyzing large data sets and acquiring applicable outcomes that are proposed to be used for specific purposes in various ranges of business.In the virtual environments, many attacks are launched for obtaining advantages through information leakages from their targets. The motivation behind investigation techniques in digital security is to end up distinctly more adaptable with changes in adversary behaviors. Visual examination and prediction algorithms seem to contribute considerable a lot in resolving cyber security issues. Exploring large data sets, achieving knowledge, forensic investigation, are representing the most known cases in cyber security big data solutions.To get significant information from analytics, the most important steps to take before analyzing data are to normalize, eliminate duplicates and put it in a format that can enhance the proficiency of an algorithm. Nor...
2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4)
Keeping a rigorous focus on the lifecycle and evolution of data mining can prove difficult, espec... more Keeping a rigorous focus on the lifecycle and evolution of data mining can prove difficult, especially when dealing with devising a new machine learning mechanism or process. Access to the appropriate tooling and experimentation resources is instrumental for researchers operating in this domain. As data scientists, we all probably spent hours customizing a working environment at least once. We recognized that the tools, utilities, and techniques are more or so the same. Therefore, maintaining a custom environment while keeping all the software up-to-date can be a monotonous chore. This paper presents our take on developing a community workstation with artificial intelligence in mind. Dubbed ECLAIR, the framework includes a full portable laboratory for all kinds of data science processes, from data collection to analysis and insights delivery. With this distribution, end-users can apply statistical modeling to investigate and exploit various datasets. It also embeds everything needed by a developer to write his software for experimentation.
2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Journal of Military Technology
Informatica Economica, 2016
Threat information exchange is a critical part of any security system. Decisions regarding securi... more Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the "brownfiled" devices.
2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), 2014
2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY), 2016
2016 International Conference on Communications (COMM), 2016
2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2016
2016 International Conference on Communications (COMM), 2016
As the Internet grows at a phenomenal rate email systems has become a widely used electronic form... more As the Internet grows at a phenomenal rate email systems has become a widely used electronic form of communication. Everyday, a large number of people exchange messages in this fast and inexpensive way. With the excitement on electronic commerce growing, the usage of email will increase more exponential. In this paper we present our research in developing general method for intrusion detection in email system Internet-based. The main ideas are to use data mining techniques to discover consistent and useful patterns of email system that can recognize anomalies and known intrusions.