About

README


I am a Postdoctoral Researcher at IBM Research. I received my PhD from the University of New Mexico under the advisement of Stephanie Forrest in 2016. My research blends the fields of security, data science and complex systems. I am currently applying advanced machine learning technique to classic computer security problems and developing statistical, agent-based, and game theoretic models to identify which cybersecurity interventions are effective at an organizational and global scale.

Research

Cyber Security Informatics


The main thrust of my research involves applying statistical and machine learning techniques to gain insight in a variety of security domains.

PDF Risky Business: Assessing Security with External Measurements. Benjamin Edwards, Jay Jacobs, and Stephanie Forrest. Pre-print, 2016.

PDF Internet Topology and Packet Speed Reflect Censorship Patterns Cynthia Freeman, Benjamin Edwards, Daniel Adams, Jedidiah Crandall, Stephanie Forrest. Pre-print, 2016

LINK Data Analysis is the new Risk Analysis. Benjamin Edwards and Jay Jacobs. Invited talk, RSA Conference, Advancing Information Risk Practices Seminar.

Link Hype and heavy tails: A closer look at data breaches. Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. Journal of Cybersecurity, Early access. December 2016. Contains updated data from WEIS submission.

PDF Analyzing and modeling longitudinal security data: Promise and pitfalls. Benjamin Edwards, Steven Hofmeyr, Stephanie Forrest, and Michel Van Eeten. In Proceedings of the 31st Annual Computer Security Applications Conference, pp. 391-400. ACM, 2015.

PDF Hype and heavy tails: A closer look at data breaches. Benjamin Edwards, Steven Hofmeyr, and Stephanie Forrest. In The Workshop on the Economics of Information Security (WEIS). 2015.

This paper received a significant amount of media attention:

Abstract Security Models


Even in the abscence of data we can still build meaningful models and gain an understanding of the security landscape. I’ve worked to refine several types of models to tackle a variety of security problems.

LINK Strategic aspects of cyberattack, attribution, and blame. Benjamin Edwards, Alexander Furnas, Stephanie Forrest, and Robert Axelrod. Proceedings of the National Academy of Sciences. February 27, 2017.

Media coverage of this work

PDF Beyond the blacklist: modeling malware spread and the effect of interventions. Benjamin Edwards, Tyler Moore, George Stelle, Steven Hofmeyr, and Stephanie Forrest. In Proceedings of the 2012 workshop on New security paradigms, pp. 53-66. ACM, 2012.

PDF Modeling internet-scale policies for cleaning up malware. Steven Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, and George Stelle. In Economics of Information Security and Privacy III, pp. 149-170. Springer New York, 2013.

Cybersecurity and Complex Systems


PDF How do complex systems protect themselves from malicious behavior?. Benjamin Edwards and Stephanie Forrest. Conference on Complex Systems, 2015.

Link The Complex Science of Cyber Defense. Stephanie Forrest, Steven Hofmeyr, and Benjamin Edwards. Harvard Business Review. June 2013.

Other


I have also collaborated on a few other research projects which do not fit the main thrust of my research. This includes studies into the similarity between metabolic scaling in animals and computer chip design, studies of the evolution of the network topologies over time, regulation of the software industry.

PDF Energy and time determine scaling in biological and computer designs. Melanie Moses, George Bezerra, Benjamin Edwards, James Brown, and Stephanie Forrest Phil. Trans. R. Soc. B 371, no. 1701 (2016): 20150446.

PDF Panel Summary: The Future of Software Regulation. Benjamin Edwards, Michael Locasto, and Jeremy Epstein. In Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 117-126. ACM, 2014.

PDF Application and analysis of multidimensional negative surveys in participatory sensing applications. Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He, and Stephanie Forrest. Pervasive and Mobile Computing 9, no. 3 (2013): 372-391.

PDF Internet topology over time. Benjamin Edwards, Steven Hofmeyr, George Stelle, and Stephanie Forrest. arXiv preprint arXiv:1202.3993 (2012).

PDF Enhancing privacy in participatory sensing applications with multidimensional data. Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He, and Stephanie Forrest. In Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference on, pp. 144-152. IEEE, 2012.

Service

PC


  • 2013-2017 New Security Paradigms Workshop
  • 2016-2017 Workshop on the Economics of Information Security
  • 2016 Workshop on Data Mining for Cyber Security

Reviewing


  • Computers and Security
  • Complex Adaptive Systems Modeling
  • Journal of Artificial Life
  • Journal of Complex Networks
  • Journal of Cybersecurity
  • Journal of Statistical Mechanics
  • PLoS One
  • Telecommunication Systems
  • Transactions of Evolutionary Computation