Skip to main content

Showing 1–4 of 4 results for author: Keppitiyagama, C

.
  1. arXiv:2202.07883  [pdf, other

    cs.CR

    CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

    Authors: Wathsara Daluwatta, Ravindu De Silva, Sanduni Kariyawasam, Mohamed Nabeel, Charith Elvitigala, Kasun De Zoysa, Chamath Keppitiyagama

    Abstract: Ability to effectively investigate indicators of compromise and associated network resources involved in cyber attacks is paramount not only to identify affected network resources but also to detect related malicious resources. Today, most of the cyber threat intelligence platforms are reactive in that they can identify attack resources only after the attack is carried out. Further, these systems… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: threat intelligence graph investigation

  2. arXiv:2202.07882  [pdf, other

    cs.CR

    PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs

    Authors: Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama

    Abstract: Blacklists are a widely-used Internet security mechanism to protect Internet users from financial scams, malicious web pages and other cyber attacks based on blacklisted URLs. In this demo, we introduce PhishChain, a transparent and decentralized system to blacklisting phishing URLs. At present, public/private domain blacklists, such as PhishTank, CryptoScamDB, and APWG, are maintained by a centra… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: phishing blockchain blocklisting

  3. arXiv:2111.00142  [pdf, other

    cs.CR cs.LG

    Uncovering IP Address Hosting Types Behind Malicious Websites

    Authors: Nimesha Wickramasinghe, Mohamed Nabeel, Kenneth Thilakaratne, Chamath Keppitiyagama, Kasun De Zoysa

    Abstract: Hundreds of thousands of malicious domains are created everyday. These malicious domains are hosted on a wide variety of network infrastructures. Traditionally, attackers utilize bullet proof hosting services (e.g. MaxiDed, Cyber Bunker) to take advantage of relatively lenient policies on what content they can host. However, these IP ranges are increasingly being blocked or the services are taken… ▽ More

    Submitted 28 November, 2021; v1 submitted 29 October, 2021; originally announced November 2021.

  4. arXiv:2009.05966  [pdf

    cs.NI cs.SI

    COMONet: Community Mobile Network

    Authors: Primal Wijesekera, Chamath I. Keppitiyagama

    Abstract: The density of mobile phones has increased rapidly in recent years. One drawback of the current mobile telephone technology is that it forces all the calls to go through cellular base stations even if the caller and the callee are within the radio range of each other. Hybrid cellular networks and Unlicensed Mobile Access (UMA) have been proposed as solutions that enable mobile phone users to bypas… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.