Menasché, Daniel Sadoc
Online Learning of Weakly Coupled MDP Policies for Load Balancing and Auto Scaling
Eshwar, S. R., Felipe, Lucas Lopes, Reiffers-Masson, Alexandre, Menasché, Daniel Sadoc, Thoppe, Gugan
Load balancing and auto scaling are at the core of scalable, contemporary systems, addressing dynamic resource allocation and service rate adjustments in response to workload changes. This paper introduces a novel model and algorithms for tuning load balancers coupled with auto scalers, considering bursty traffic arriving at finite queues. We begin by presenting the problem as a weakly coupled Markov Decision Processes (MDP), solvable via a linear program (LP). However, as the number of control variables of such LP grows combinatorially, we introduce a more tractable relaxed LP formulation, and extend it to tackle the problem of online parameter learning and policy optimization using a two-timescale algorithm based on the LP Lagrangian.
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Moreno-Vera, Felipe, Nogueira, Mateus, Figueiredo, Cainã, Menasché, Daniel Sadoc, Bicudo, Miguel, Woiwood, Ashton, Lovat, Enrico, Kocheturov, Anton, de Aguiar, Leandro Pfleger
This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums. The increasing volume of posts discussing exploitation in the wild calls for an automatic approach to process threads and posts that will eventually trigger alarms depending on their content. To illustrate the proposed system, we use the CrimeBB dataset, which contains data scraped from multiple underground forums, and develop a supervised machine learning model that can filter threads citing CVEs and label them as Proof-of-Concept, Weaponization, or Exploitation. Leveraging random forests, we indicate that accuracy, precision and recall above 0.99 are attainable for the classification task. Additionally, we provide insights into the difference in nature between weaponization and exploitation, e.g., interpreting the output of a decision tree, and analyze the profits and other aspects related to the hacking communities. Overall, our work sheds insight into the exploitation of vulnerabilities in the wild and can be used to provide additional ground truth to models such as EPSS and Expected Exploitability.