Machine learning models for phishing detection from TLS traffic

M Kumar, C Kondaiah, AR Pais, RS Rao - Cluster Computing, 2023 - Springer
Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as
passwords, account details, credit card details, and other sensitive information. Existing anti …

Improved phishing detection algorithms using adversarial autoencoder synthesized data

H Shirazi, SR Muramudalige, I Ray… - 2020 ieee 45th …, 2020 - ieeexplore.ieee.org
Malicious actors often use phishing attacks to compromise legitimate users' credentials.
Machine learning is a promising approach for phishing detection. While the accuracy of …

Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms

H Shirazi, SR Muramudalige, I Ray… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Supervised machine learning is often used to detect phishing websites. However, the
scarcity of phishing data for training purposes limits the classifier's performance. Further …

Domain-independent deception: Definition, taxonomy and the linguistic cues debate

RM Verma, N Dershowitz, V Zeng, X Liu - arXiv preprint arXiv:2207.01738, 2022 - arxiv.org
Internet-based economies and societies are drowning in deceptive attacks. These attacks
take many forms, such as fake news, phishing, and job scams, which we call" domains of …

Real-Time, Evidence-Based Alerts for Protection from Phishing Attacks

S Baki, FZ Qachfar, RM Verma… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Despite two decades of research on automatic filtering systems, phishing attacks remain a
serious problem. To alleviate risks from filtering failures, we design and evaluate the …

Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble

C Kondaiah, AR Pais, RS Rao - Journal of Network and Systems …, 2024 - Springer
The use of encryption for network communication leads to a significant challenge in
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …

Automating investigative pattern detection using machine learning & graph pattern matching techniques

SR Muramudalige - 2022 - search.proquest.com
Identification and analysis of latent and emergent behavioral patterns are core tasks in
investigative domains such as homeland security, counterterrorism, and crime prevention …

PhishBench 2.0: a versatile and extendable benchmarking framework for phishing

V Zeng, X Zhou, S Baki, RM Verma - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We describe version 2.0 of our benchmarking framework, PhishBench. With the addition of
the ability to dynamically load features, metrics, and classifiers, our new and improved …

Less is more: Exploiting social trust to increase the effectiveness of a deception attack

S Baki, RM Verma, A Mukherjee, O Gnawali - arXiv preprint arXiv …, 2020 - arxiv.org
Cyber attacks such as phishing, IRS scams, etc., still are successful in fooling Internet users.
Users are the last line of defense against these attacks since attackers seem to always find a …

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics

KK Choo, A Dehghantanha - 2020 - aisel.aisnet.org
One emerging research focus is cyber threat intelligence and analytics, which seeks to
integrate and deploy different computing techniques such as big data analytics, sentiment …