Academic FAQ

/Academic FAQ

December CAE Tech Talk

Please join us for the December CAE Tech Talk on December 16, 2021 beginning at 1:00 pm EST.

Below are the details for the presentations and the logistics for attendance:

Time: 1:00-1:50 pm EST
Topic: President’s Cup Cybersecurity Competition: Building a Competition Across the Federal Workforce
Location: https://capitol.adobeconnect.com/cae_tech_talk/

AND

Time: 2:00 – 2:50 pm EST
Topic: AI for Cybersecurity and Cyber Security for AI
Location: https://capitol.adobeconnect.com/cae_tech_talk/

Just log in as “Guest” and enter your name. No password required.

If you have a topic you’d like to present, please email [email protected].

Thanks,

Lauren M. Scott
CAE Program Management Office

CAETechTalk_16 December

VEST: AN EARLY WARNING SYSTEM FOR FUTURE CYBER ATTACKS

Want to learn more about predicting cyber attacks?

Join us Friday, Dec. 10th at 11am MT for this virtual event!

To Register in advance for this meeting, CLICK HERE. After registering, you will receive a confirmation email containing information about joining the meeting. 

Speaker:  Professor V.S. Subrahmanian is the Walter P. Murphy Professor of Computer Science and Buffett Faculty Fellow in the Buffett Institute for Global Affairs at Northwestern University. For a full bio, visit MLC.

Abstract:  We consider the problem of predicting cyber attacks based on known Common Vulnerability & Exposure (CVE) numbers. Given a CVE, we wish to answer 3 questions: (i) Will the CVE be exploited by malicious hackers? (ii) If so, when? (iii) How severe will the attack be? The answers to these questions are critical for almost all companies with significant software/hardware investments, for manufacturers of those software/hardware components, and for governments of the nations involved. In this talk, I will primarily focus on when a vulnerability will be exploited. Using a 23-month dataset gleaned from 5 sources, I will present a novel family of CAT (CVE-Author-Tweet) graphs. Each CAT graph has a massive associated system of recursive equations whose solution yields “popularity scores’’ for the CVE-Author-Tweet nodes in the graph. Using these scores for different CAT graphs, we show a model that can predict when a vulnerability will be exploited – and we will use real world case studies to illustrate the efficacy of the approach. The talk will briefly describe progress on problems (i) and (iii) as well, and will describe a research agenda going forward that uses the predictions generated to better secure an enterprise. I will conclude with a brief outline of policy questions resulting from our work.

2021-12-06T14:55:50-05:00December 6th, 2021|Academic FAQ, Community, Conferences|