Skip to main content

Showing 1–6 of 6 results for author: Elvitigala, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17068  [pdf, other

    cs.CR

    Semantic Ranking for Automated Adversarial Technique Annotation in Security Text

    Authors: Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov

    Abstract: We introduce a new method for extracting structured threat behaviors from threat intelligence text. Our method is based on a multi-stage ranking architecture that allows jointly optimizing for efficiency and effectiveness. Therefore, we believe this problem formulation better aligns with the real-world nature of the task considering the large number of adversary techniques and the extensive body o… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  2. arXiv:2208.08486  [pdf, other

    cs.CL

    EmoMent: An Emotion Annotated Mental Health Corpus from two South Asian Countries

    Authors: Thushari Atapattu, Mahen Herath, Charitha Elvitigala, Piyanjali de Zoysa, Kasun Gunawardana, Menasha Thilakaratne, Kasun de Zoysa, Katrina Falkner

    Abstract: People often utilise online media (e.g., Facebook, Reddit) as a platform to express their psychological distress and seek support. State-of-the-art NLP techniques demonstrate strong potential to automatically detect mental health issues from text. Research suggests that mental health issues are reflected in emotions (e.g., sadness) indicated in a person's choice of language. Therefore, we develope… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: This work has been accepted to appear at COLING 2022 Conference

  3. arXiv:2202.07883  [pdf, other

    cs.CR

    CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

    Authors: Wathsara Daluwatta, Ravindu De Silva, Sanduni Kariyawasam, Mohamed Nabeel, Charith Elvitigala, Kasun De Zoysa, Chamath Keppitiyagama

    Abstract: Ability to effectively investigate indicators of compromise and associated network resources involved in cyber attacks is paramount not only to identify affected network resources but also to detect related malicious resources. Today, most of the cyber threat intelligence platforms are reactive in that they can identify attack resources only after the attack is carried out. Further, these systems… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: threat intelligence graph investigation

  4. arXiv:2202.07882  [pdf, other

    cs.CR

    PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs

    Authors: Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama

    Abstract: Blacklists are a widely-used Internet security mechanism to protect Internet users from financial scams, malicious web pages and other cyber attacks based on blacklisted URLs. In this demo, we introduce PhishChain, a transparent and decentralized system to blacklisting phishing URLs. At present, public/private domain blacklists, such as PhishTank, CryptoScamDB, and APWG, are maintained by a centra… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: phishing blockchain blocklisting

  5. arXiv:2102.12223  [pdf, other

    cs.SI

    Malicious and Low Credibility URLs on Twitter during the AstraZeneca COVID-19 Vaccine Development

    Authors: Sameera Horawalavithana, Ravindu De Silva, Mohamed Nabeel, Charitha Elvitigala, Primal Wijesekara, Adriana Iamnitchi

    Abstract: We investigate the link sharing behavior of Twitter users following the temporary halt of AstraZeneca COVID-19 vaccine development in September 2020. During this period, we show the presence of malicious and low credibility information sources shared on Twitter messages in multiple languages. The malicious URLs, often in shortened forms, are increasingly hosted in content delivery networks and sha… ▽ More

    Submitted 27 May, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

    Comments: Published in International Conference on Social Computing, Behavioral- Cultural Modeling, & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS), DC, USA, 2021. This paper has won the Grand Challenge, North American Social Network Conference, 2021

  6. arXiv:1910.12244  [pdf, other

    cs.CR cs.CY

    Investigating MMM Ponzi scheme on Bitcoin

    Authors: Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah

    Abstract: Cybercriminals exploit cryptocurrencies to carry out illicit activities. In this paper, we focus on Ponzi schemes that operate on Bitcoin and perform an in-depth analysis of MMM, one of the oldest and most popular Ponzi schemes. Based on 423K transactions involving 16K addresses, we show that: (1) Starting Sep 2014, the scheme goes through three phases over three years. At its peak, MMM circulated… ▽ More

    Submitted 1 December, 2019; v1 submitted 27 October, 2019; originally announced October 2019.