Search Results for author: Raj Gaire

Found 6 papers, 2 papers with code

Profiler: Profile-Based Model to Detect Phishing Emails

no code implementations18 Aug 2022 Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal

The Profiler does not require large data sets to train on to be effective and its analysis of varied email features reduces the impact of concept drift.

Towards Web Phishing Detection Limitations and Mitigation

no code implementations3 Apr 2022 Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solutions are laid bare.

Attribute

Characterizing Malicious URL Campaigns

1 code implementation29 Aug 2021 Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.

ReinforceBug: A Framework to Generate Adversarial Textual Examples

no code implementations NAACL 2021 Bushra Sabir, M. Ali Babar, Raj Gaire

Adversarial Examples (AEs) generated by perturbing original training examples are useful in improving the robustness of Deep Learning (DL) based models.

Semantic Similarity Semantic Textual Similarity

Machine Learning for Detecting Data Exfiltration: A Review

no code implementations17 Dec 2020 Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire

Objective: This paper aims at systematically reviewing ML-based data exfiltration countermeasures to identify and classify ML approaches, feature engineering techniques, evaluation datasets, and performance metrics used for these countermeasures.

Automated Feature Engineering BIG-bench Machine Learning +1

Reliability and Robustness analysis of Machine Learning based Phishing URL Detectors

1 code implementation18 May 2020 Bushra Sabir, M. Ali Babar, Raj Gaire, Alsharif Abuadbba

Therefore, the security vulnerabilities of these systems, in general, remain primarily unknown which calls for testing the robustness of these systems.

Cannot find the paper you are looking for? You can Submit a new open access paper.