Skip to main content

Showing 1–11 of 11 results for author: Piplai, A

.
  1. arXiv:2404.19744  [pdf, other

    cs.CR cs.AI

    PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification

    Authors: Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi

    Abstract: Data protection and privacy is becoming increasingly crucial in the digital era. Numerous companies depend on third-party vendors and service providers to carry out critical functions within their operations, encompassing tasks such as data handling and storage. However, this reliance introduces potential vulnerabilities, as these vendors' security measures and practices may not always align with… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  2. arXiv:2402.17249  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework

    Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai

    Abstract: The ever-evolving ways attacker continues to im prove their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increa… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 8

  3. arXiv:2402.17045  [pdf, other

    cs.CR cs.AI cs.LG

    An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

    Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai

    Abstract: In this research, we analyzed the suitability of each of the current state-of-the-art machine learning models for various cyberattack detection from the past 5 years with a major emphasis on the most recent works for comparative study to identify the knowledge gap where work is still needed to be done with regard to detection of each category of cyberattack. We also reviewed the suitability, effec… ▽ More

    Submitted 10 May, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: 10

  4. arXiv:2401.10036  [pdf, other

    cs.CR cs.AI cs.IR cs.LO

    LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

    Authors: Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

    Abstract: Security Operations Center (SoC) analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs. These analysts also depend on internal repositories, which act as private local knowledge database for an organization. Credible cyber intelligence, critical operational details, and relevant organizational information… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  5. arXiv:2401.05680  [pdf, other

    cs.CR cs.AI cs.LG cs.NE

    Use of Graph Neural Networks in Aiding Defensive Cyber Operations

    Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

    Abstract: In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information. Additionally, cyber-attacks differ depending on the objective and evolve rapidly to disguise defensive systems. However, a typical cyber-attack demonstrates a series of stages from attack i… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 35 pages, 9 figures, 8 tables

  6. arXiv:2308.02031  [pdf, other

    cs.CY cs.AI cs.CR cs.LG

    Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

    Authors: Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

    Abstract: Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems. This approach addresses a key criticism of current generation systems, namely their inability to generate human-understandable expla… ▽ More

    Submitted 24 July, 2023; originally announced August 2023.

    Comments: 4 pages, 1 figure (To Appear in IEEE Internet Computing)

  7. arXiv:2102.04351  [pdf, other

    cs.CR cs.AI

    Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

    Authors: Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

    Abstract: Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-Source Intelligence (OSINT) communities or on the Web to effect a data poisoning attack on these systems. Adversaries can use fake CTI examples as tra… ▽ More

    Submitted 18 June, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

    Comments: In Proceedings of International Joint Conference on Neural Networks 2021 (IJCNN 2021), July 2021

  8. arXiv:2006.01284  [pdf, ps, other

    cs.LG stat.ML

    Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19

    Authors: Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı

    Abstract: Social media has become an important communication channel during high impact events, such as the COVID-19 pandemic. As misinformation in social media can rapidly spread, creating social unrest, curtailing the spread of misinformation during such events is a significant data challenge. While recent solutions that are based on machine learning have shown promise for the detection of misinformation,… ▽ More

    Submitted 30 June, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

  9. arXiv:2002.08527  [pdf, ps, other

    cs.LG cs.CR

    NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

    Authors: Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi

    Abstract: With the recent developments in artificial intelligence and machine learning, anomalies in network traffic can be detected using machine learning approaches. Before the rise of machine learning, network anomalies which could imply an attack, were detected using well-crafted rules. An attacker who has knowledge in the field of cyber-defence could make educated guesses to sometimes accurately predic… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

    Comments: 6 pages, 2 figures. 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020)

  10. arXiv:1905.02497  [pdf, other

    cs.CL cs.AI cs.CR

    RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

    Authors: Aditya **le, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

    Abstract: Security Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a significant difference in their ability to detect attacks. Open source threat intelligence sources, like text descriptions about cyber-attacks, can be stored in a structured fashio… ▽ More

    Submitted 16 May, 2019; v1 submitted 7 May, 2019; originally announced May 2019.

  11. arXiv:1603.08564  [pdf

    cs.CV stat.ML

    Kernelized Weighted SUSAN based Fuzzy C-Means Clustering for Noisy Image Segmentation

    Authors: Satrajit Mukherjee, Bodhisattwa Prasad Majumder, Aritran Piplai, Swagatam Das

    Abstract: The paper proposes a novel Kernelized image segmentation scheme for noisy images that utilizes the concept of Smallest Univalue Segment Assimilating Nucleus (SUSAN) and incorporates spatial constraints by computing circular colour map induced weights. Fuzzy dam** coefficients are obtained for each nucleus or center pixel on the basis of the corresponding weighted SUSAN area values, the weights b… ▽ More

    Submitted 28 March, 2016; originally announced March 2016.

    Comments: Journal Version