Machine learning models for phishing detection from TLS traffic
Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as
passwords, account details, credit card details, and other sensitive information. Existing anti …
passwords, account details, credit card details, and other sensitive information. Existing anti …
Improved phishing detection algorithms using adversarial autoencoder synthesized data
Malicious actors often use phishing attacks to compromise legitimate users' credentials.
Machine learning is a promising approach for phishing detection. While the accuracy of …
Machine learning is a promising approach for phishing detection. While the accuracy of …
Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms
H Shirazi, SR Muramudalige, I Ray… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Supervised machine learning is often used to detect phishing websites. However, the
scarcity of phishing data for training purposes limits the classifier's performance. Further …
scarcity of phishing data for training purposes limits the classifier's performance. Further …
Domain-independent deception: Definition, taxonomy and the linguistic cues debate
Internet-based economies and societies are drowning in deceptive attacks. These attacks
take many forms, such as fake news, phishing, and job scams, which we call" domains of …
take many forms, such as fake news, phishing, and job scams, which we call" domains of …
Real-Time, Evidence-Based Alerts for Protection from Phishing Attacks
Despite two decades of research on automatic filtering systems, phishing attacks remain a
serious problem. To alleviate risks from filtering failures, we design and evaluate the …
serious problem. To alleviate risks from filtering failures, we design and evaluate the …
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble
The use of encryption for network communication leads to a significant challenge in
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …
Automating investigative pattern detection using machine learning & graph pattern matching techniques
SR Muramudalige - 2022 - search.proquest.com
Identification and analysis of latent and emergent behavioral patterns are core tasks in
investigative domains such as homeland security, counterterrorism, and crime prevention …
investigative domains such as homeland security, counterterrorism, and crime prevention …
PhishBench 2.0: a versatile and extendable benchmarking framework for phishing
We describe version 2.0 of our benchmarking framework, PhishBench. With the addition of
the ability to dynamically load features, metrics, and classifiers, our new and improved …
the ability to dynamically load features, metrics, and classifiers, our new and improved …
Less is more: Exploiting social trust to increase the effectiveness of a deception attack
Cyber attacks such as phishing, IRS scams, etc., still are successful in fooling Internet users.
Users are the last line of defense against these attacks since attackers seem to always find a …
Users are the last line of defense against these attacks since attackers seem to always find a …
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics
KK Choo, A Dehghantanha - 2020 - aisel.aisnet.org
One emerging research focus is cyber threat intelligence and analytics, which seeks to
integrate and deploy different computing techniques such as big data analytics, sentiment …
integrate and deploy different computing techniques such as big data analytics, sentiment …