-
A note on improvement by iteration for the approximate solutions of second kind Fredholm integral equations with Green's kernels
Authors:
Gobinda Rakshit,
Shashank K. Shukla,
Akshay S. Rane
Abstract:
Consider a linear operator equation $x - Kx = f$, where $f$ is given and $K$ is a Fredholm integral operator with a Green's function type kernel defined on $C[0, 1]$. For $r \geq 1$, we employ the interpolatory projection at $2r + 1$ collocation points (not necessarily Gauss points) onto a space of piecewise polynomials of degree $\leq 2r$ with respect to a uniform partition of $[0, 1]$. Previous…
▽ More
Consider a linear operator equation $x - Kx = f$, where $f$ is given and $K$ is a Fredholm integral operator with a Green's function type kernel defined on $C[0, 1]$. For $r \geq 1$, we employ the interpolatory projection at $2r + 1$ collocation points (not necessarily Gauss points) onto a space of piecewise polynomials of degree $\leq 2r$ with respect to a uniform partition of $[0, 1]$. Previous researchers have established that the iteration in case of the collocation method improves the order of convergence by projection methods and its variants in the case of smooth kernel with piecewise polynomials of even degree only. In this article, we demonstrate the improvement in order of convergence by modified collocation method when the kernel is of Green's function type.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Constraining scalars of $16_H$ through proton decays in non-renormalisable $SO(10)$ models
Authors:
Saurabh K. Shukla
Abstract:
Non-renormalisable versions of $SO(10)$ based on irreducible representations with lesser degrees of freedom, are free of running into the catastrophe of non-perturbativity of standard model gauge couplings in contrast to the renormalisable versions having tensors with many degrees of freedom. $16_H$ is the smallest representation, participates in Yukawa Lagrangian at the non-renormalisable level,…
▽ More
Non-renormalisable versions of $SO(10)$ based on irreducible representations with lesser degrees of freedom, are free of running into the catastrophe of non-perturbativity of standard model gauge couplings in contrast to the renormalisable versions having tensors with many degrees of freedom. $16_H$ is the smallest representation, participates in Yukawa Lagrangian at the non-renormalisable level, contributing to the charged and neutral fermion masses, and has six distinct scalars with different $B-L$ charges. We computed the leptoquark and diquark couplings of different pairs of scalars stemming from all possible decomposition of the term resulting from the coupling of $16_{\rm{H}}$ with the $\mathbf{16}$ dimensional fermion multiplet of $SO(10)$, i.e. $\frac{\mathbf{16}\,\mathbf{16}\,16_{\rm{H}}\,16_{\rm{H}}}Λ$. Computing the tree and loop level contribution of different pairs to the effective dimension six, $B-L$ conserving operators, it turns out only three pairs, viz $σ\big(1,1,0\big)- T\big(3,1,\frac{1}{3}\big)$, and $H\big(1,2,-\frac{1}{2}\big)-Δ\big(3,2,\frac{1}{6}\big)$, and $H-T$ can induce proton decay at tree level. Assuming that the Yukawa couplings of the $16_{\rm{H}}$ are comparable to those of the $\overline{126}_{\rm{H}}$ of a realistic SO(10) model and setting the cutoff scale to the Planck scale typically constrains the $B-L$ breaking scale to be $4\sim 5$ orders of magnitude less than the cutoff scale $(Λ)$. Moreover, analysing the branching pattern of the leading two-body decay modes of the proton, we observed a preference for the proton to decay into second-generation mesons due to the hierarchical nature of Yukawa couplings. In a realistic $SO(10)$ scenario, we find that $M_T >10^{8}$ TeV, while $M_Δ$ could be as light as a few TeV$s$.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Authors:
Nanda Rani,
Bikash Saha,
Vikas Maurya,
Sandeep Kumar Shukla
Abstract:
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured…
▽ More
Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured format. This research introduces a methodology named TTPXHunter for the automated extraction of threat intelligence in terms of Tactics, Techniques, and Procedures (TTPs) from finished cyber threat reports. It leverages cyber domain-specific state-of-the-art natural language processing (NLP) to augment sentences for minority class TTPs and refine pinpointing the TTPs in threat analysis reports significantly. The knowledge of threat intelligence in terms of TTPs is essential for comprehensively understanding cyber threats and enhancing detection and mitigation strategies. We create two datasets: an augmented sentence-TTP dataset of 39,296 samples and a 149 real-world cyber threat intelligence report-to-TTP dataset. Further, we evaluate TTPXHunter on the augmented sentence dataset and the cyber threat reports. The TTPXHunter achieves the highest performance of 92.42% f1-score on the augmented dataset, and it also outperforms existing state-of-the-art solutions in TTP extraction by achieving an f1-score of 97.09% when evaluated over the report dataset. TTPXHunter significantly improves cybersecurity threat intelligence by offering quick, actionable insights into attacker behaviors. This advancement automates threat intelligence analysis, providing a crucial tool for cybersecurity professionals fighting cyber threats.
△ Less
Submitted 21 March, 2024; v1 submitted 5 March, 2024;
originally announced March 2024.
-
Quantum corrections and the minimal Yukawa sector of $SU(5)$
Authors:
Ketan M. Patel,
Saurabh K. Shukla
Abstract:
It is well-known that the $SU(5)$ grand unified theory, with the standard model quarks and leptons unified in $\overline{5}$ and $10$ and the electroweak Higgs doublet residing in $5$ dimensional representations, leads to relation, $Y_d=Y_e^T$, between the Yukawa couplings of the down-type quarks and the charged leptons. We show that this degeneracy can be lifted in a phenomenologically viable way…
▽ More
It is well-known that the $SU(5)$ grand unified theory, with the standard model quarks and leptons unified in $\overline{5}$ and $10$ and the electroweak Higgs doublet residing in $5$ dimensional representations, leads to relation, $Y_d=Y_e^T$, between the Yukawa couplings of the down-type quarks and the charged leptons. We show that this degeneracy can be lifted in a phenomenologically viable way when quantum corrections to the tree-level matching conditions are taken into account in the presence of one or more copies of gauge singlet fermions. The 1-loop threshold corrections arising from heavy leptoquark scalar and vector bosons, already present in the minimal model, and heavy singlet fermions can lead to realistic Yukawa couplings provided their masses differ by at least two orders of magnitude. The latter can also lead to a realistic light neutrino mass spectrum through the type I seesaw mechanism if the colour partner of the Higgs stays close to the Planck scale. Most importantly, our findings demonstrate the viability of the simplest Yukawa sector when quantum corrections are considered and sizeable threshold effects are present.
△ Less
Submitted 10 January, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads
Authors:
P. V. Sai Charan,
Hrushikesh Chunduri,
P. Mohan Anand,
Sandeep K Shukla
Abstract:
This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this…
▽ More
This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this study, we systematically generated implementable code for the top-10 MITRE Techniques prevalent in 2022, utilizing ChatGPT, and conduct a comparative analysis of its performance with Google's Bard. Our experimentation reveals that ChatGPT has the potential to enable attackers to accelerate the operation of more targeted and sophisticated attacks. Additionally, the technology provides amateur attackers with more capabilities to perform a wide range of attacks and empowers script kiddies to develop customized tools that contribute to the acceleration of cybercrime. Furthermore, LLMs significantly benefits malware authors, particularly ransomware gangs, in generating sophisticated variants of wiper and ransomware attacks with ease. On a positive note, our study also highlights how offensive security researchers and pentesters can make use of LLMs to simulate realistic attack scenarios, identify potential vulnerabilities, and better protect organizations. Overall, we conclude by emphasizing the need for increased vigilance in mitigating the risks associated with LLMs. This includes implementing robust security measures, increasing awareness and education around the potential risks of this technology, and collaborating with security experts to stay ahead of emerging threats.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators
Authors:
Trishie Sharma,
Rachit Agarwal,
Sandeep Kumar Shukla
Abstract:
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudulent schemes aimed at stealing investors' funds. Using data from 758 rug pulls across 10 NFT marketplaces, we examine the structural and behavioral pro…
▽ More
The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudulent schemes aimed at stealing investors' funds. Using data from 758 rug pulls across 10 NFT marketplaces, we examine the structural and behavioral properties of these schemes, identify the characteristics and motivations of rug-pullers, and classify NFT projects into groups based on creators' association with their accounts. Our findings reveal that repeated rug pulls account for a significant proportion of the rise in NFT-related cryptocurrency crimes, with one NFT collection attempting 37 rug pulls within three months. Additionally, we identify the largest group of creators influencing the majority of rug pulls, and demonstrate the connection between rug-pullers of different NFT projects through the use of the same wallets to store and move money. Our study contributes to the understanding of NFT market risks and provides insights for designing preventative strategies to mitigate future losses.
△ Less
Submitted 15 April, 2023;
originally announced April 2023.
-
Spectrum of colour sextet scalars in realistic SO(10) GUT
Authors:
Ketan M. Patel,
Saurabh K. Shukla
Abstract:
Incorporation of the standard model Yukawa interactions in a grand unified theory (GUT) often predicts varieties of new scalars that couple to the fermions and lead to some novel observational effects. We assess such a possibility for the colour sextet diquark scalars within the realistic renormalizable models based on $SO(10)$ GUT. The spectrum consists of five sextets:…
▽ More
Incorporation of the standard model Yukawa interactions in a grand unified theory (GUT) often predicts varieties of new scalars that couple to the fermions and lead to some novel observational effects. We assess such a possibility for the colour sextet diquark scalars within the realistic renormalizable models based on $SO(10)$ GUT. The spectrum consists of five sextets: $Σ\sim (6,1,-\frac{2}{3})$, $S \sim (6,1,\frac{1}{3})$, $\overline{S}\sim(\overline{6},1,-\frac{1}{3})$, ${\cal S}\sim(6,1,\frac{4}{3})$ and $\mathbb{S}\sim(\overline{6},3,-\frac{1}{3})$. Computing explicitly their couplings with the quarks, we evaluate their contributions to the neutral meson-antimeson mixing and baryon number-violating processes like neutron-antineutron oscillation. The latter arises because of a $B-L$ violating trilinear coupling between the sextets which also contributes to some of the quartic couplings and perturbativity of the same leads to strong limits on the sextet masses. Using the values of the $B-L$ breaking scale and Yukawa couplings permitted in the realistic models, we derive constraints on the masses of these scalars. It is found that $Σ$ along with any of the remaining sextets cannot be lighter than the $B-L$ breaking scale, simultaneously. In the realm of realistic models, this implies no observable $n$-$\bar{n}$ oscillation in near future experiments. We also point out a possibility in which sub-GUT scale $Σ$ and a pair of $S$, allowed by the other constraints, can viably produce the observed baryon asymmetry of the universe.
△ Less
Submitted 9 March, 2023; v1 submitted 21 November, 2022;
originally announced November 2022.
-
DNS based In-Browser Cryptojacking Detection
Authors:
Rohit Kumar Sachan,
Rachit Agarwal,
Sandeep Kumar Shukla
Abstract:
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptojacking. We use temporal features such as query frequency and query burst along with graph-based features such as degree and diameter, and non-temporal…
▽ More
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptojacking. We use temporal features such as query frequency and query burst along with graph-based features such as degree and diameter, and non-temporal features such as the string-based to detect if a DNs is suspect to be involved in the in-browser cryptojacking. Then, we use them to train the Machine Learning (ML) algorithms over different temporal granularities such as 2 hours datasets and complete dataset. Our results show DecisionTrees classifier performs the best with 59.5% Recall on cryptojacked DN, while for unsupervised learning, K-Means with K=2 perform the best. Similarity analysis of the features reveals a minimal divergence between the cryptojacking DNs and other already known malicious DNs. It also reveals the need for improvements in the feature set of state-of-the-art methods to improve their accuracy in detecting in-browser cryptojacking. As added analysis, our signature-based analysis identifies that none-of-the Indian Government websites were involved in cryptojacking during October-December 2021. However, based on the resource utilization, we identify 10 DNs with different properties than others.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Authors:
Vikas Maurya,
Rachit Agarwal,
Saurabh Kumar,
Sandeep Kumar Shukla
Abstract:
Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been develo…
▽ More
Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been developing cyber security solutions for CIs to avoid lasting damages. According to standard frameworks, cyber security based on identification, protection, detection, response, and recovery are at the core of these research. Detection of an ongoing attack that escapes standard protection such as firewall, anti-virus, and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the system. Therefore, anomaly detection in physical dynamics proves an effective means to implement defense-in-depth. PASAD is one example of anomaly detection in the sensor/actuator data, representing such systems' physical dynamics. We present EPASAD, which improves the detection technique used in PASAD to detect these micro-stealthy attacks, as our experiments show that PASAD's spherical boundary-based detection fails to detect. Our method EPASAD overcomes this by using Ellipsoid boundaries, thereby tightening the boundaries in various dimensions, whereas a spherical boundary treats all dimensions equally. We validate EPASAD using the dataset produced by the TE-process simulator and the C-town datasets. The results show that EPASAD improves PASAD's average recall by 5.8% and 9.5% for the two datasets, respectively.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
Anatomy of scalar mediated proton decays in $SO(10)$ models
Authors:
Ketan M. Patel,
Saurabh K. Shukla
Abstract:
Realistic models based on the renormalizable grand unified theories have varieties of scalars, many of which are capable of mediating baryon ($B$) and lepton ($L$) number non-conserving processes. We identify all such scalar fields residing in ${\bf 10}$, $\overline{\bf 126}$ and ${\bf 120}$ dimensional irreps of $SO(10)$ which can induce baryon and lepton number violating interactions through the…
▽ More
Realistic models based on the renormalizable grand unified theories have varieties of scalars, many of which are capable of mediating baryon ($B$) and lepton ($L$) number non-conserving processes. We identify all such scalar fields residing in ${\bf 10}$, $\overline{\bf 126}$ and ${\bf 120}$ dimensional irreps of $SO(10)$ which can induce baryon and lepton number violating interactions through the leading order $d=6$ and $d=7$ operators. Explicitly computing their couplings with the standard model fermions, we derive the effective operators including the possibility of mixing between the scalars stemming from a given representation. We find that such interactions at $d=6$ are mediated by only three sets of scalars: $T(3,1,-1/3)$, ${\cal T} (3,1,-4/3)$ and $\mathbb{T}(3,3,-1/3)$ and their conjugates. In the models with ${\bf 10}$ and $\overline{\bf 126}$, only the first has appropriate couplings to mediate the proton decay. While ${\cal T}$ and $\mathbb{T}$ can induce baryon number violating interactions when ${\bf 120}$ is present, ${\cal T}$ does not contribute to the proton decay at tree level because of its flavour antisymmetric coupling. Three additional colour triplets and their conjugates can mediate nucleon decay via $d=7$ operators which violate also the $B-L$. We give general expressions for partial widths of proton in terms of the fundamental Yukawa couplings and use these results to explicitly compute the proton lifetime and branching ratios for the minimal non-supersymmetric $SO(10)$ model based on ${\bf 10}$ and $\overline{\bf 126}$ Higgs. We find that the proton preferably decays into $\overlineν\, K^+$ or $μ^+\, K^0$ and list several distinct features of scalar mediated proton decay. If the latter dominates over the gauge mediated contributions, the proton decay spectrum provides a direct probe to the flavour structure of the underlying grand unified theory.
△ Less
Submitted 4 August, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Towards Malicious address identification in Bitcoin
Authors:
Deepesh Chaudhari,
Rachit Agarwal,
Sandeep Kumar Shukla
Abstract:
The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not directly applicable in the Bitcoin blockchain. Several pre-processing steps should be performed before such temporal aspects are utilized. We are moti…
▽ More
The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not directly applicable in the Bitcoin blockchain. Several pre-processing steps should be performed before such temporal aspects are utilized. We are motivated to study the Bitcoin transaction network and use the temporal features such as burst, attractiveness, and inter-event time along with several graph-based properties such as the degree of node and clustering coefficient to validate the applicability of already existing approaches known for other cryptocurrency blockchains on the Bitcoin blockchain. We generate the temporal and non-temporal feature set and train the Machine Learning (ML) algorithm over different temporal granularities to validate the state-of-the-art methods. We study the behavior of the addresses over different time granularities of the dataset. We identify that after applying change-address clustering, in Bitcoin, existing temporal features can be extracted and ML approaches can be applied. A comparative analysis of results show that the behavior of addresses in Ethereum and Bitcoin is similar with respect to in-degree, out-degree and inter-event time. Further, we identify 3 suspects that showed malicious behavior across different temporal granularities. These suspects are not marked as malicious in Bitcoin.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase
Authors:
Mayank Pandey,
Rachit Agarwal,
Sandeep Kumar Shukla,
Nishchal Kumar Verma
Abstract:
In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilitate activities such as money laundering, gambling, and ransomware attacks. In recent times, different machine learning-based techniques can detect such…
▽ More
In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilitate activities such as money laundering, gambling, and ransomware attacks. In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data. However, there is no provision within the blockchain to deal with such elements. We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities. We select Algorand blockchain to implement our methodology by incorporating it within the consensus protocol. The theoretical results obtained prove the restriction and exclusion of criminal elements through block proposal rejection and attenuation of the voting power as a validator for such entities. Further, we analyze the efficacy of our method and show that it puts no additional strain on the communication resources.
△ Less
Submitted 25 August, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain
Authors:
Banwari Lal,
Rachit Agarwal,
Sandeep Kumar Shukla
Abstract:
The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art…
▽ More
The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art techniques for detecting malicious actors depend on the transactional behavior of individual wallet addresses but do not analyze the money trails. We propose a heuristics-based approach that adds new features associated with money trails to analyze and find suspicious activities in cryptocurrency blockchains. Here, we focus only on the cyclic behavior and identify hidden patterns present in the temporal transactions graphs in a blockchain. We demonstrate our methods on the transaction data of the Ethereum blockchain. We find that malicious activities (such as Gambling, Phishing, and Money Laundering) have different cyclic patterns in Ethereum. We also identify two suspicious temporal cyclic path-based transfers in Ethereum. Our techniques may apply to other cryptocurrency blockchains with appropriate modifications adapted to the nature of the crypto-currency under investigation.
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Authors:
Rachit Agarwal,
Tanmay Thapliyal,
Sandeep Kumar Shukla
Abstract:
Smart Contracts (SCs) in Ethereum can automate tasks and provide different functionalities to a user. Such automation is enabled by the `Turing-complete' nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In thi…
▽ More
Smart Contracts (SCs) in Ethereum can automate tasks and provide different functionalities to a user. Such automation is enabled by the `Turing-complete' nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In this work, we study the correlation between malicious activities and the vulnerabilities present in SCs and find that some malicious activities are correlated with certain types of vulnerabilities. We then develop and study the feasibility of a scoring mechanism that corresponds to the severity of the vulnerabilities present in SCs to determine if it is a relevant feature to identify suspicious SCs. We analyze the utility of severity score towards detection of suspicious SCs using unsupervised machine learning (ML) algorithms across different temporal granularities and identify behavioral changes. In our experiments with on-chain SCs, we were able to find a total of 1094 benign SCs across different granularities which behave similar to malicious SCs, with the inclusion of the smart contract vulnerability scores in the feature set.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Authors:
Rohit Kumar Sachan,
Rachit Agarwal,
Sandeep Kumar Shukla
Abstract:
The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of…
▽ More
The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of using metadata such as Domain Name (DN) associated with the account in the blockchain and identify whether an account should be tagged malicious or not. Here, we leverage the temporal aspects attached to the DNs. Our results identify 144930 DNs that show malicious behavior, and out of these, 54114 DNs show persistent malicious behavior over time. Nonetheless, none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Security of Healthcare Data Using Blockchains: A Survey
Authors:
Mayank Pandey,
Rachit Agarwal,
Sandeep K. Shukla,
Nishchal K. Verma
Abstract:
The advancement in the healthcare sector is entering into a new era in the form of Health 4.0. The integration of innovative technologies like Cyber-Physical Systems (CPS), Big Data, Cloud Computing, Machine Learning, and Blockchain with Healthcare services has led to improved performance and efficiency through data-based learning and interconnection of systems. On the other hand, it has also incr…
▽ More
The advancement in the healthcare sector is entering into a new era in the form of Health 4.0. The integration of innovative technologies like Cyber-Physical Systems (CPS), Big Data, Cloud Computing, Machine Learning, and Blockchain with Healthcare services has led to improved performance and efficiency through data-based learning and interconnection of systems. On the other hand, it has also increased complexities and has brought its own share of vulnerabilities due to the heavy influx, sharing, and storage of healthcare data. The protection of the same from cyber-attacks along with privacy preservation through authenticated access is one of the significant challenges for the healthcare sector. For this purpose, the use of blockchain-based networks can lead to a considerable reduction in the vulnerabilities of the healthcare systems and secure their data. This chapter explores blockchain's role in strengthening healthcare data security by answering the questions related to what data use, when we need, why we need, who needs, and how state-of-the-art techniques use blockchains to secure healthcare data. As a case study, we also explore and analyze the state-of-the-art implementations for blockchain in healthcare data security for the COVID-19 pandemic. In order to provide a path to future research directions, we identify and discuss the technical limitations and regulatory challenges associated with blockchain-based healthcare data security implementation.
△ Less
Submitted 23 March, 2021;
originally announced March 2021.
-
Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Authors:
Rachit Agarwal,
Tanmay Thapliyal,
Sandeep K. Shukla
Abstract:
Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious expl…
▽ More
Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants. To that end, we identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity in the available dataset, as well as is robust against adversarial attacks. We find that most of the malicious activities reported thus far, for example, in Ethereum blockchain ecosystem, behaves statistically similar. Further, the previously used ML algorithms for identifying malicious accounts show bias towards a particular malicious activity which is over-represented. In the sequel, we identify that Neural Networks (NN) holds up the best in the face of such bias inducing dataset at the same time being robust against certain adversarial attacks.
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix
Authors:
Aneet K. Dutta,
Bhaskar Mukhoty,
Sandeep K. Shukla
Abstract:
Regular and uninterrupted operation of critical infrastructures such as power, transport, communication etc. are essential for proper functioning of a country. Cyber-attacks causing disruption in critical infrastructure service in the past, are considered as a significant threat. With the advancement in technology and the progress of the critical infrastructures towards IP based communication, cyb…
▽ More
Regular and uninterrupted operation of critical infrastructures such as power, transport, communication etc. are essential for proper functioning of a country. Cyber-attacks causing disruption in critical infrastructure service in the past, are considered as a significant threat. With the advancement in technology and the progress of the critical infrastructures towards IP based communication, cyber-physical systems are lucrative targets of the attackers. In this paper, we propose a robust multivariate intrusion detection system called RAD for detecting attacks in the cyber-physical systems in O(d) space and time complexity, where d is the number parameters in the system state vector. The proposed Intrusion Detection System(IDS) is developed in an unsupervised learning setting without using labelled data denoting attacks. It allows a fraction of the training data to be corrupted by outliers or under attack, by subscribing to robust training procedure. The proposed IDS outperforms existing anomaly detection techniques in several real-world datasets and attack scenarios.
△ Less
Submitted 7 September, 2020;
originally announced September 2020.
-
Fermionic quantum cellular automata and generalized matrix product unitaries
Authors:
Lorenzo Piroli,
Alex Turzillo,
Sujeet K. Shukla,
J. Ignacio Cirac
Abstract:
We study matrix product unitary operators (MPUs) for fermionic one-dimensional (1D) chains. In stark contrast with the case of 1D qudit systems, we show that (i) fermionic MPUs do not necessarily feature a strict causal cone and (ii) not all fermionic Quantum Cellular Automata (QCA) can be represented as fermionic MPUs. We then introduce a natural generalization of the latter, obtained by allowing…
▽ More
We study matrix product unitary operators (MPUs) for fermionic one-dimensional (1D) chains. In stark contrast with the case of 1D qudit systems, we show that (i) fermionic MPUs do not necessarily feature a strict causal cone and (ii) not all fermionic Quantum Cellular Automata (QCA) can be represented as fermionic MPUs. We then introduce a natural generalization of the latter, obtained by allowing for an additional operator acting on their auxiliary space. We characterize a family of such generalized MPUs that are locality-preserving, and show that, up to appending inert ancillary fermionic degrees of freedom, any representative of this family is a fermionic QCA and viceversa. Finally, we prove an index theorem for generalized MPUs, recovering the recently derived classification of fermionic QCA in one dimension. As a technical tool for our analysis, we also introduce a graded canonical form for fermionic matrix product states, proving its uniqueness up to similarity transformations.
△ Less
Submitted 9 December, 2020; v1 submitted 23 July, 2020;
originally announced July 2020.
-
Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties
Authors:
Rachit Agarwal,
Shikhar Barve,
Sandeep K. Shukla
Abstract:
The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal feat…
▽ More
The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) algorithms and identify the algorithm that performs the best in detecting which accounts are malicious. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For Ethereum blockchain, we identify that for the entire dataset - the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.
△ Less
Submitted 28 January, 2021; v1 submitted 10 July, 2020;
originally announced July 2020.
-
A tensor network approach to 2D bosonization
Authors:
Sujeet K. Shukla,
Tyler D. Ellison,
Lukasz Fidkowski
Abstract:
We present a 2D bosonization duality using the language of tensor networks. Specifically, we construct a tensor network operator (TNO) that implements an exact 2D bosonization duality. The primary benefit of the TNO is that it allows for bosonization at the level of quantum states. Thus, we use the TNO to provide an explicit algorithm for bosonizing fermionic projected entangled pair states (fPEPs…
▽ More
We present a 2D bosonization duality using the language of tensor networks. Specifically, we construct a tensor network operator (TNO) that implements an exact 2D bosonization duality. The primary benefit of the TNO is that it allows for bosonization at the level of quantum states. Thus, we use the TNO to provide an explicit algorithm for bosonizing fermionic projected entangled pair states (fPEPs). A key step in the algorithm is to account for a choice of spin-structure, encoded in a set of bonds of the bosonized fPEPS. This enables our tensor network approach to bosonization to be applied to systems on arbitrary triangulations of orientable 2D manifolds.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Sequence to sequence deep learning models for solar irradiation forecasting
Authors:
Bhaskar Pratim Mukhoty,
Vikas Maurya,
Sandeep Kumar Shukla
Abstract:
The energy output a photo voltaic(PV) panel is a function of solar irradiation and weather parameters like temperature and wind speed etc. A general measure for solar irradiation called Global Horizontal Irradiance (GHI), customarily reported in Watt/meter$^2$, is a generic indicator for this intermittent energy resource. An accurate prediction of GHI is necessary for reliable grid integration of…
▽ More
The energy output a photo voltaic(PV) panel is a function of solar irradiation and weather parameters like temperature and wind speed etc. A general measure for solar irradiation called Global Horizontal Irradiance (GHI), customarily reported in Watt/meter$^2$, is a generic indicator for this intermittent energy resource. An accurate prediction of GHI is necessary for reliable grid integration of the renewable as well as for power market trading. While some machine learning techniques are well introduced along with the traditional time-series forecasting techniques, deep-learning techniques remains less explored for the task at hand. In this paper we give deep learning models suitable for sequence to sequence prediction of GHI. The deep learning models are reported for short-term forecasting $\{1-24\}$ hour along with the state-of-the art techniques like Gradient Boosted Regression Trees(GBRT) and Feed Forward Neural Networks(FFNN).
We have checked that spatio-temporal features like wind direction, wind speed and GHI of neighboring location improves the prediction accuracy of the deep learning models significantly. Among the various sequence-to-sequence encoder-decoder models LSTM performed superior, handling short-comings of the state-of-the-art techniques.
△ Less
Submitted 30 April, 2019;
originally announced April 2019.
-
Determination of Power of Groove fields belonging to the wedge regions adjacent to a convex triangular obstacle associated with Dirichlet conditions subject to axially independent EM fields
Authors:
Sanjay Kumar,
Suresh K. Shukla
Abstract:
A convex triangular obstacle forms a vital part of a periodic echellete grating. A triangular grating is characterized by three parameters like period, depth and flare angle. Knowledge of groove field is essential for precise designing of triangular corrugated structures for studying the blazing effect of propagating EM wave. In the present paper, an attempt has been made to determine the power of…
▽ More
A convex triangular obstacle forms a vital part of a periodic echellete grating. A triangular grating is characterized by three parameters like period, depth and flare angle. Knowledge of groove field is essential for precise designing of triangular corrugated structures for studying the blazing effect of propagating EM wave. In the present paper, an attempt has been made to determine the power of Groove fields belonging to a pair of groove regions adjacent to a convex triangular prism. Groove fields and their associated powers based on Dirichlet conditions on the groove surfaces have been determined. The governing Helmholtz wave equation has been solved for determining the free surface field and the groove field. Fourier-Bessel series, oblique coordinate transformations and Lommel's integral are used as tools.
△ Less
Submitted 23 January, 2019;
originally announced January 2019.
-
Verity: Blockchains to Detect Insider Attacks in DBMS
Authors:
Shubham S. Srivastava,
Medha Atre,
Shubham Sharma,
Rahul Gupta,
Sandeep K. Shukla
Abstract:
Integrity and security of the data in database systems are typically maintained with access control policies and firewalls. However, insider attacks -- where someone with an intimate knowledge of the system and administrative privileges tampers with the data -- pose a unique challenge. Measures like append only logging prove to be insufficient because an attacker with administrative privileges can…
▽ More
Integrity and security of the data in database systems are typically maintained with access control policies and firewalls. However, insider attacks -- where someone with an intimate knowledge of the system and administrative privileges tampers with the data -- pose a unique challenge. Measures like append only logging prove to be insufficient because an attacker with administrative privileges can alter logs and login records to eliminate the trace of attack, thus making insider attacks hard to detect.
In this paper, we propose Verity -- first of a kind system to the best of our knowledge. Verity serves as a dataless framework by which any blockchain network can be used to store fixed-length metadata about tuples from any SQL database, without complete migration of the database. Verity uses a formalism for parsing SQL queries and query results to check the respective tuples' integrity using blockchains to detect insider attacks. We have implemented our technique using Hyperledger Fabric, Composer REST API, and SQLite database. Using TPC-H data and SQL queries of varying complexity and types, our experiments demonstrate that any overhead of integrity checking remains constant per tuple in a query's results, and scales linearly.
△ Less
Submitted 1 January, 2019;
originally announced January 2019.
-
Matrix Product Representation of Locality Preserving Unitaries
Authors:
M. Burak Şahinoğlu,
Sujeet K. Shukla,
Feng Bi,
Xie Chen
Abstract:
The matrix product representation provides a useful formalism to study not only entangled states, but also entangled operators in one dimension. In this paper, we focus on unitary transformations and show that matrix product operators that are unitary provides a necessary and sufficient representation of 1D unitaries that preserve locality. That is, we show that matrix product operators that are u…
▽ More
The matrix product representation provides a useful formalism to study not only entangled states, but also entangled operators in one dimension. In this paper, we focus on unitary transformations and show that matrix product operators that are unitary provides a necessary and sufficient representation of 1D unitaries that preserve locality. That is, we show that matrix product operators that are unitary are guaranteed to preserve locality by mapping local operators to local operators while at the same time all locality preserving unitaries can be represented in a matrix product way. Moreover, we show that the matrix product representation gives a straight-forward way to extract the GNVW index defined in Ref.\cite{Gross2012} for classifying 1D locality preserving unitaries. The key to our discussion is a set of `fixed point' conditions which characterize the form of the matrix product unitary operators after blocking sites. Finally, we show that if the unitary condition is relaxed and only required for certain system sizes, the matrix product operator formalism allows more possibilities than locality preserving unitaries. In particular, we give an example of a simple matrix product operator which is unitary only for odd system sizes, does not preserve locality and carries a `fractional' index as compared to their locality preserving counterparts.
△ Less
Submitted 6 April, 2017;
originally announced April 2017.
-
Boson condensation and instability in the tensor network representation of string-net states
Authors:
Sujeet K. Shukla,
M. Burak Şahinoğlu,
Frank Pollmann,
Xie Chen
Abstract:
The tensor network representation of many-body quantum states, given by local tensors, provides a promising numerical tool for the study of strongly correlated topological phases in two dimension. However, tensor network representations may be vulnerable to instabilities caused by small perturbations of the local tensor, especially when the local tensor is not injective. For example, the topologic…
▽ More
The tensor network representation of many-body quantum states, given by local tensors, provides a promising numerical tool for the study of strongly correlated topological phases in two dimension. However, tensor network representations may be vulnerable to instabilities caused by small perturbations of the local tensor, especially when the local tensor is not injective. For example, the topological order in tensor network representations of the toric code ground state has been shown to be unstable under certain small variations of the local tensor, if these small variations do not obey a local $Z_2$ symmetry of the tensor. In this paper, we ask the questions of whether other types of topological orders suffer from similar kinds of instability and if so, what is the underlying physical mechanism and whether we can protect the order by enforcing certain symmetries on the tensor. We answer these questions by showing that the tensor network representation of all string-net models are indeed unstable, but the matrix product operator (MPO) symmetries of the local tensor can help to protect the order. We find that, `stand-alone' variations that break the MPO symmetries lead to instability because they induce the condensation of bosonic quasi-particles and destroy the topological order in the system. Therefore, such variations must be forbidden for the encoded topological order to be reliably extracted from the local tensor. On the other hand, if a tensor network based variational algorithm is used to simulate the phase transition due to boson condensation, then such variation directions must be allowed in order to access the continuous phase transition process correctly.
△ Less
Submitted 13 March, 2018; v1 submitted 3 October, 2016;
originally announced October 2016.
-
Killing Correspondence in Finsler Spaces
Authors:
Suresh K. Shukla,
M. K. Gupta
Abstract:
The present paper deals with the Killing correspondence between some Finsler spaces. We consider a Finsler space equipped with a $β$-change of metric and study the Killing correspondence between the original Finsler space and the Finsler space equipped with $β$-change of metric. We obtain necessary and sufficient condition for a vector field Killing in the original Finsler space to be Killing in t…
▽ More
The present paper deals with the Killing correspondence between some Finsler spaces. We consider a Finsler space equipped with a $β$-change of metric and study the Killing correspondence between the original Finsler space and the Finsler space equipped with $β$-change of metric. We obtain necessary and sufficient condition for a vector field Killing in the original Finsler space to be Killing in the Finsler space equipped with $β$-change of metric. Certain consequences of such result are also discussed.
△ Less
Submitted 24 April, 2014;
originally announced April 2014.
-
Expressing the Behavior of Three Very Different Concurrent Systems by Using Natural Extensions of Separation Logic
Authors:
Edgar G. Daylight,
Sandeep K. Shukla,
Davide Sergio
Abstract:
Separation Logic is a non-classical logic used to verify pointer-intensive code. In this paper, however, we show that Separation Logic, along with its natural extensions, can also be used as a specification language for concurrent-system design. To do so, we express the behavior of three very different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The Subway is originally implemen…
▽ More
Separation Logic is a non-classical logic used to verify pointer-intensive code. In this paper, however, we show that Separation Logic, along with its natural extensions, can also be used as a specification language for concurrent-system design. To do so, we express the behavior of three very different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The Subway is originally implemented in LUSTRE, the Stopwatch in Esterel, and the 2x2 Switch in Bluespec.
△ Less
Submitted 10 November, 2009;
originally announced November 2009.
-
Electron transport across electrically switchable magnetic molecules
Authors:
Sujeet K. Shukla,
Stefano Sanvito
Abstract:
We investigate the electron transport properties of a model magnetic molecule formed by two magnetic centers whose exchange coupling can be altered with a longitudinal electric field. In general we find a negative differential conductance at low temperatures originating from the different scattering amplitudes of the singlet and triplet states. More interestingly, when the molecule is strongly c…
▽ More
We investigate the electron transport properties of a model magnetic molecule formed by two magnetic centers whose exchange coupling can be altered with a longitudinal electric field. In general we find a negative differential conductance at low temperatures originating from the different scattering amplitudes of the singlet and triplet states. More interestingly, when the molecule is strongly coupled to the leads and the potential drop at the magnetic centers is only weakly dependent on the magnetic configuration, we find that there is a critical voltage V_C at which the current becomes independent of the temperature. This corresponds to a peak in the low temperature current noise. In such limit we demonstrate that the quadratic current fluctuations are proportional to the product between the conductance fluctuations and the temperature.
△ Less
Submitted 11 May, 2009;
originally announced May 2009.