Matthew Miller

Learn More
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost factors associated with an IDS, which include development cost, operational cost, damage cost due to successful intrusions, and the(More)
Intrusion detection systems (IDSs) must be capable of detecting new and unknown attacks, or anomalies. We study the problem of building detection models for both pure anomaly detection and combined misuse and anomaly detection (i.e., detection of both known and unknown intrusions). We show the necessity of artificial anomalies by discussing the failure to(More)
In this paper, we present an overview of our research in real time data mining-based intrusion detection systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real time environment. We describe our approaches to address three types of issues: accuracy, efficiency, and usability. To improve accuracy, data mining programs are(More)
In this paper, we present adaptive model generation, a method for automatically building detection models for data-mining based intrusion detection systems. Using the same data collected by intrusion detection sensors, adaptive model generation builds detection models on the fly. This significantly reduces the deployment cost of an intrusion detection(More)
Iron chelators are pluripotent neuronal antiapoptotic agents that have been shown to enhance metabolic recovery in cerebral ischemia models. The precise mechanism(s) by which these agents exert their effects remains unclear. Recent studies have demonstrated that iron chelators activate a hypoxia signal transduction pathway in non-neuronal cells that(More)
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique over data gathered from two different network environments. ESD is evaluated over 74 hours of tcpdump packet traces (344 million packets) from a large enclave; PSD is evaluated over(More)
1Department of Neurology and 2Program in Neuroscience, Harvard Medical School and The Beth Israel Deaconess Medical Center, Boston, Massachusetts 02115, 3Department of Cancer Cell Biology, Harvard School of Public Health, Boston, Massachusetts, and 4Institute of Genetic Medicine and Departments of 5Neuroscience, 6Pediatrics, and 7Psychiatry and Behavioral(More)
During meiosis, a single round of DNA replication is followed by two consecutive rounds of nuclear divisions called meiosis I and meiosis II. In meiosis I, homologous chromosomes segregate, while sister chromatids remain together. Determining how this unusual chromosome segregation behavior is established is central to understanding germ cell development.(More)
The development and survival of all organisms depends on equal partitioning of their genomes during cell division. Accurate chromosome segregation requires selective stabilization of kinetochore-microtubule attachments that come under tension due to opposing pulling forces exerted on sister kinetochores by dynamic microtubule tips. Here, we show that the(More)
Kinetochores assemble on centromeric DNA and present arrays of proteins that attach directly to the dynamic ends of microtubules. Kinetochore proteins coordinate at the microtubule interface through oligomerization, but how oligomerization contributes to kinetochore function has remained unclear. Here, using a combination of biophysical assays and live-cell(More)