Skip to main content

Showing 1–14 of 14 results for author: Divakaran, D M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11338  [pdf, other

    cs.CR cs.SE

    LLMs for Cyber Security: New Opportunities

    Authors: Dinil Mon Divakaran, Sai Teja Peddinti

    Abstract: Large language models (LLMs) are a class of powerful and versatile models that are beneficial to many industries. With the emergence of LLMs, we take a fresh look at cyber security, specifically exploring and summarizing the potential of LLMs in addressing challenging problems in the security and safety domains.

    Submitted 17 April, 2024; originally announced April 2024.

  2. arXiv:2401.08363  [pdf, other

    cs.CR

    Mitigating Bias in Machine Learning Models for Phishing Webpage Detection

    Authors: Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das

    Abstract: The widespread accessibility of the Internet has led to a surge in online fraudulent activities, underscoring the necessity of shielding users' sensitive information from cybercriminals. Phishing, a well-known cyberattack, revolves around the creation of phishing webpages and the dissemination of corresponding URLs, aiming to deceive users into sharing their sensitive information, often for identi… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

  3. arXiv:2312.04577  [pdf, other

    cs.CR cs.NI

    The Evolution of DNS Security and Privacy

    Authors: Levente Csikor, Dinil Mon Divakaran

    Abstract: DNS, one of the fundamental protocols of the TCP/IP stack, has evolved over the years to protect against threats and attacks. This study examines the risks associated with DNS and explores recent advancements that contribute towards making the DNS ecosystem resilient against various attacks while safeguarding user privacy.

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 9 pages, 4 figures - original manuscript submitted to IEEE Security & Privacy Magazine

  4. arXiv:2310.08036  [pdf, other

    cs.NI cs.CR cs.LG

    ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification

    Authors: Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy

    Abstract: Recent research works have proposed machine learning models for classifying IoT devices connected to a network. However, there is still a practical challenge of not having all devices (and hence their traffic) available during the training of a model. This essentially means, during the operational phase, we need to classify new devices not seen in the training phase. To address this challenge, we… ▽ More

    Submitted 12 January, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

    Comments: 9 pages, 6 figures, 3 tables

  5. arXiv:2308.09392  [pdf, other

    cs.CR

    Attacking logo-based phishing website detectors with adversarial perturbations

    Authors: Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran

    Abstract: Recent times have witnessed the rise of anti-phishing schemes powered by deep learning (DL). In particular, logo-based phishing detectors rely on DL models from Computer Vision to identify logos of well-known brands on webpages, to detect malicious webpages that imitate a given brand. For instance, Siamese networks have demonstrated notable performance for these tasks, enabling the corresponding a… ▽ More

    Submitted 12 September, 2023; v1 submitted 18 August, 2023; originally announced August 2023.

    Comments: To appear in ESORICS 2023

  6. arXiv:2205.07411  [pdf, other

    cs.CR

    Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

    Authors: Dinil Mon Divakaran, Adam Oest

    Abstract: Phishing attacks trick victims into disclosing sensitive information. To counter rapidly evolving attacks, we must explore machine learning and deep learning models leveraging large-scale data. We discuss models built on different kinds of data, along with their advantages and disadvantages, and present multiple deployment options to detect phishing attacks.

    Submitted 15 May, 2022; originally announced May 2022.

    Comments: Paper accepted for publication at IEEE Security & Privacy

  7. arXiv:2203.16802  [pdf, other

    cs.CR

    SIERRA: Ranking Anomalous Activities in Enterprise Networks

    Authors: Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran

    Abstract: An enterprise today deploys multiple security middleboxes such as firewalls, IDS, IPS, etc. in its network to collect different kinds of events related to threats and attacks. These events are streamed into a SIEM (Security Information and Event Management) system for analysts to investigate and respond quickly with appropriate actions. However, the number of events collected for a single enterpri… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: to appear in IEEE European Symposium on Security and Privacy (EuroS&P) 2022

  8. Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten

    Authors: Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low

    Abstract: As the use of machine learning (ML) models is becoming increasingly popular in many real-world applications, there are practical challenges that need to be addressed for model maintenance. One such challenge is to 'undo' the effect of a specific subset of dataset used for training a model. This specific subset may contain malicious or adversarial data injected by an attacker, which affects the mod… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

    Comments: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), May 30-June 3, 2022, Nagasaki, Japan

  9. arXiv:2110.00250  [pdf

    cs.CR cs.NI

    A Step Towards On-Path Security Function Outsourcing

    Authors: Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You

    Abstract: Security function outsourcing has witnessed both research and deployment in the recent years. While most existing services take a straight-forward approach of cloud hosting, on-path transit networks (such as ISPs) are increasingly more interested in offering outsourced security services to end users. Recent proposals (such as SafeBricks and mbTLS) have made it possible to outsource sensitive secur… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: Proceedings of International Conference on Distributed Computing and Networking (ICDCN 2022)

  10. arXiv:2101.04338  [pdf, other

    cs.CR cs.NI

    A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes

    Authors: Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai

    Abstract: Middleboxes in a computer network system inspect and analyse network traffic to detect malicious communications, monitor system performance and provide operational services. However, encrypted traffic hinders the ability of middleboxes to perform such services. A common practice in addressing this issue is by employing a "Man-in-the-Middle" (MitM) approach, wherein an encrypted traffic flow betwee… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

    Comments: 17 pages, 8 figures, 2 tables

  11. arXiv:2012.03293  [pdf, other

    cs.NI

    DiffPerf: Towards Performance Differentiation and Optimization with SDN Implementation

    Authors: Walid Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma

    Abstract: Continuing the current trend, Internet traffic is expected to grow significantly over the coming years, with video traffic consuming the biggest share. On the one hand, this growth poses challenges to access providers (APs), who have to upgrade their infrastructure to meet the growing traffic demands as well as find new ways to monetize their network resources. On the other hand, despite numerous… ▽ More

    Submitted 6 December, 2020; originally announced December 2020.

  12. arXiv:2011.09107  [pdf, other

    cs.CR cs.DC cs.NI

    On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch

    Authors: Levente Csikor, Vipul Ujawane, Dinil Mon Divakaran

    Abstract: Being a crucial part of networked systems, packet classification has to be highly efficient; however, software switches in cloud environments still face performance challenges. The recently proposed Tuple Space Explosion (TSE) attack exploits an algorithmic deficiency in Open vSwitch (OVS). In TSE, legitimate low-rate attack traffic makes the cardinal linear search algorithm in the Tuple Space Sea… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 13 pages + bios in IEEE two-column journal style Submitted only to arXiv!

  13. Cost-aware Feature Selection for IoT Device Classification

    Authors: Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy

    Abstract: Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices, with promising results. However, existing works have assumed that the features used for building the machine learning models are readily available or… ▽ More

    Submitted 21 April, 2021; v1 submitted 2 September, 2020; originally announced September 2020.

    Comments: 33 pages, 9 figures

    Journal ref: Internet of Things Journal 2021

  14. arXiv:1903.06661  [pdf, other

    cs.LG stat.ML

    GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection

    Authors: Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan

    Abstract: This paper looks into the problem of detecting network anomalies by analyzing NetFlow records. While many previous works have used statistical models and machine learning techniques in a supervised way, such solutions have the limitations that they require large amount of labeled data for training and are unlikely to detect zero-day attacks. Existing anomaly detection solutions also do not provide… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: to appear in 2019 IEEE Conference on Communications and Network Security (CNS)