Search Results for author: Aritran Piplai

Found 10 papers, 1 papers with code

Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework

no code implementations27 Feb 2024 Tosin Ige, Christopher Kiekintveld, Aritran Piplai

The ever-evolving ways attacker continues to im prove their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack.

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

no code implementations26 Feb 2024 Tosin Ige, Christopher Kiekintveld, Aritran Piplai

Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system.

Cyber Attack Detection

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

no code implementations18 Jan 2024 Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.

Retrieval

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

no code implementations11 Jan 2024 Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information.

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

no code implementations25 Jul 2023 Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems.

Knowledge Graphs

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

no code implementations8 Feb 2021 Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.

Data Poisoning Knowledge Graphs +2

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

no code implementations20 Feb 2020 Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi

In this paper, we show that even if we build a classifier and train it with adversarial examples for network data, we can use adversarial attacks and successfully break the system.

BIG-bench Machine Learning Efficient Neural Network +1

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

no code implementations7 May 2019 Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.

Relation Relation Extraction

Kernelized Weighted SUSAN based Fuzzy C-Means Clustering for Noisy Image Segmentation

1 code implementation28 Mar 2016 Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das

The paper proposes a novel Kernelized image segmentation scheme for noisy images that utilizes the concept of Smallest Univalue Segment Assimilating Nucleus (SUSAN) and incorporates spatial constraints by computing circular colour map induced weights.

Clustering Image Segmentation +1

Cannot find the paper you are looking for? You can Submit a new open access paper.