Christopher Sweet

I'm Chris Sweet, a Computer Engineer. This site is dedicated to my graduate publications on Deep Learning applied to Cyber Intrusion Alert Systems. Feel free to reach out to me at the email below with any questions

  • On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
    • Christopher Sweet

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Stephen Moskal

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Shanchieh Jay Yang

      Rochester Institute of Technology, Rochester NY, USA

    ACM Transactions on Management Information Systems, Volume 11, Issue 4•December 2020, Article No.: 22, pp 1-21 • https://doi.org/10.1145/3394503

    Many cyber attack actions can be observed, but the observables often exhibit intricate feature dependencies, non-homogeneity, and potentially rare yet critical samples. This work tests the ability to learn, model, and synthesize cyber intrusion alerts ...

      • 2Citation
      • 174
      • Downloads
      Metrics
      Total Citations2
      Total Downloads174
      Last 12 Months90
      Last 6 weeks3
    • Export Citations
    • Save to Binder
      Save to Binder
      Create a New Binder
      256
    • View online with eReader
    • PDF
  • research-article
    November 2019
    Synthetic Intrusion Alert Generation through Generative Adversarial Networks
    • Christopher Sweet

      Rochester Institute of Technology,Department of Computer Engineering,Rochester, New York,14623

      ,
    • Stephen Moskal

      Rochester Institute of Technology,Department of Computer Engineering,Rochester, New York,14623

      ,
    • Shanchieh Jay Yang

      Rochester Institute of Technology,Department of Computer Engineering,Rochester, New York,14623

    MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), pp 1-6• https://doi.org/10.1109/MILCOM47813.2019.9020850

    Cyber Intrusion alerts are commonly collected by corporations to analyze network traffic and glean information about attacks perpetrated against the network. However, datasets of true malignant alerts are rare and generally only show one potential attack ...

      • 1Citation
      Metrics
      Total Citations1
    • Export Citations
    • Save to Binder
      Save to Binder
      Create a New Binder
      256
  • research-article
    Synthesizing Cyber Intrusion Alerts using Generative Adversarial Networks
    • Christopher Sweet profile imageChristopher Sweet

      Rochester Institute of Technology, Rochester NY, USA

    April 2019pp 1-96 https://scholarworks.rit.edu/theses/10008/

    Cyber attacks infiltrating enterprise computer networks continue to grow in number, severity, and complexity as our reliance on such networks grows. Despite this, proactive cyber security remains an open challenge as cyber alert data is often not available for study. Furthermore, the data that is available is stochastically distributed, imbalanced, lacks homogeneity, and ...

  • research-article
    Differentiating and Predicting Cyberattack Behaviors Using LSTM
    • Ian Perry profile imageIan Perry

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Lutzu Li profile imageLutzu Li

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Christopher Sweet profile imageChristopher Sweet

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Shao-Hsuan Su profile imageShao-Hsuan Su

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Fu-Yuan Cheng profile imageFu-Yuan Cheng

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Shanchieh Jay Yang profile imageShanchieh Jay Yang

      Rochester Institute of Technology, Rochester NY, USA

      ,
    • Ahmet Okutan profile imageAhmet Okutan

      Rochester Institute of Technology, Rochester NY, USA

    December 2018pp 1-8 https://ieeexplore.ieee.org/abstract/document/8625145

    Classifying and predicting cyberattack behaviors are outstanding challenges due to the changing and broad attack surfaces as attackers penetrate into enterprise networks. The rise of Recurrent Neural Networks (RNNs) for temporally structured data in machine learning presents an opportunity to address these challenges ...

  • Email
  • © Template Credit:
  • Design: HTML5 UP
  • Theme: Comfusion LLC