Filters








9 Hits in 6.1 sec

Evaluating a semisupervised approach to phishing url identification in a realistic scenario

Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Bradley Wardman, Gary Warner
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
Our study is targeted to detect phishing URLs in a realistic scenario of a highly imbalanced data set containing phishing and spam URLs with 1:654 ratio.  ...  We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs.  ...  The problem of classification becomes worse when the minority instances are very few in numbers. In a realistic scenario, the number of phishing URLs is never equivalent to the spam URLs.  ... 
doi:10.1145/2030376.2030397 dblp:conf/ceas/GyawaliSMWW11 fatcat:5nckfah6cfczlk4og7zhf4vj3y

A Comprehensive Survey for Intelligent Spam Email Detection

Asif Karim, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, Mamoun Alazab
2019 IEEE Access  
The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e-mail filters.  ...  INDEX TERMS Machine learning, phishing attack, spear phishing, spam detection, spam email, spam filtering. VOLUME 7, 2019 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  The classifier deals with a training dataset of malicious phishing URLs and legitimate URLs.  ... 
doi:10.1109/access.2019.2954791 fatcat:ikt6cayggbb2dkrm52fxzz2dqm

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
on protecting data in 'in use' state, therefore, future research needs to be directed towards securing data in 'in rest' and 'in transit' states (e) There is no standard or framework for evaluation of  ...  We assert the need for developing such an evaluation framework.  ...  The evaluation provided is quite weak in the sense that the authors have tested the approach for a very simple and single scenario and the results obtained from such a scenario cannot be generalized.  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  and devising a plan to avoid further attacks.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

Ricardo Ávila, Raphaël Khoury, Richard Khoury, Fábio Petrillo, Flavio Lombardi
2021 Security and Communication Networks  
The selected papers point to many opportunities that can be investigated by researchers interested in contributing to this area of research.  ...  Our findings are fourfold: (i) we propose a new classification of information leaks, which uses the GDPR principles; (ii) we identify the twenty most widely used publicly available datasets in threat detection  ...  According to the authors, the dataset generated with simulated network traffic does not matter, as the thirty-eight types of attacks and various realistic intrusion scenarios were conducted in a real network  ... 
doi:10.1155/2021/6615899 fatcat:ung2fccx25cvdne2ey2u25btuu

D2.3 - GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers

Suite5, SECURA BV, Tampere University
2020 Zenodo  
State of the art analysis on Functional Encryption and the provision of a set of GDPR-compliant analytics that can offer analytics services to providers that have access to encrypted data.  ...  The deliverable also reports on investigated and analytics techniques used by CSPs and Healthcare Providers in order to secure their infrastructures against cyber threats.  ...  A real-life scenario incorporating randomised functions, is illustrated in [44] .  ... 
doi:10.5281/zenodo.4022329 fatcat:sdtc5fkkofc6vigeil25ulhm5u

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
However, it has been found that the amount and nature of incoming and outgoing traffic to a mobile device could reveal a significant amount of information that can be used to identify the activities performed  ...  This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices.  ...  This requirement is very much similar to the scenario when a newly developed application has to be tested.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

Enabling Integrity for the Compressed Files in Cloud Server

S.K Prashanth
2013 IOSR Journal of Computer Engineering  
In this paper we provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud.  ...  The important concerns that need to be addressed in cloud computing is to assure the integrity of data i.e. correctness of his data in the cloud.  ...  Acknowledgement This work has supported in part by US National Science Foundation under grant CNS-0626601, CNS-0831963, CNS-0831628 and CNS-0716306.  ... 
doi:10.9790/0661-1240105 fatcat:suxx6aa5kneybiskk2z4n6guce

D1.3 Cyberthreats and countermeasures

Mark Ryan, Kevin Macnish, Tally Hatzakis
2019
This situation parallels to vulnerability disclosure, where researchers often need to make a trade-off between disclosing a vulnerability publicly (opening it up for potential abuse) and not disclosing  ...  While recent innovations in the machine learning domain have enabled significant improvements in a variety of computer-aided tasks, machine learning systems present us with new challenges, new risks, and  ...  Phishing messages are commonly sent via email, social media, text message, or instant message, and can include an attachment or URL, along with an accompanying message designed to trick the recipient into  ... 
doi:10.21253/dmu.7951292.v1 fatcat:w3z55dymsjcwfkhp7opx4pvhui