Submit Search
Upload
Breaking and Fixing Content-Based Filtering
•
Download as PPTX, PDF
•
1 like
•
175 views
M
Mayank Dhiman
Follow
Paper resented at APWG's eCrime 2017 conference in Scottsdale, Arizona
Read less
Read more
Science
Report
Share
Report
Share
1 of 15
Download now
Recommended
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
Winning the Big Data SPAM Challenge__HadoopSummit2010
Winning the Big Data SPAM Challenge__HadoopSummit2010
Yahoo Developer Network
Regular Expression Denial of Service RegexDoS
Regular Expression Denial of Service RegexDoS
Michael Hidalgo
Httpillage lascon-2015
Httpillage lascon-2015
forcedrequest
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
Securing Passwords
Securing Passwords
Mandeep Singh
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
Recommended
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
Winning the Big Data SPAM Challenge__HadoopSummit2010
Winning the Big Data SPAM Challenge__HadoopSummit2010
Yahoo Developer Network
Regular Expression Denial of Service RegexDoS
Regular Expression Denial of Service RegexDoS
Michael Hidalgo
Httpillage lascon-2015
Httpillage lascon-2015
forcedrequest
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
Securing Passwords
Securing Passwords
Mandeep Singh
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
SparkCognition
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
DNIF
Ready set hack
Ready set hack
GDSCBVCOENM
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
FACE
Talos
Talos
Muhammad ilyas
What is Ethical Hacking?
What is Ethical Hacking?
Dignitas Digital Pvt. Ltd.
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Ivo Andreev
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
SOASTA
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Tammy Everts
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Pro Mrkt
Security Code Review 101
Security Code Review 101
Paul Ionescu
Workshop on Network Security
Workshop on Network Security
UC San Diego
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Achievers Tech
Risk Management for LLMs
Risk Management for LLMs
Sri Ambati
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Mayank Dhiman
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Mayank Dhiman
More Related Content
Similar to Breaking and Fixing Content-Based Filtering
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
SparkCognition
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
DNIF
Ready set hack
Ready set hack
GDSCBVCOENM
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
FACE
Talos
Talos
Muhammad ilyas
What is Ethical Hacking?
What is Ethical Hacking?
Dignitas Digital Pvt. Ltd.
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Ivo Andreev
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
SOASTA
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Tammy Everts
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Pro Mrkt
Security Code Review 101
Security Code Review 101
Paul Ionescu
Workshop on Network Security
Workshop on Network Security
UC San Diego
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Achievers Tech
Risk Management for LLMs
Risk Management for LLMs
Sri Ambati
Similar to Breaking and Fixing Content-Based Filtering
(20)
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
Ready set hack
Ready set hack
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Talos
Talos
What is Ethical Hacking?
What is Ethical Hacking?
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Security Code Review 101
Security Code Review 101
Workshop on Network Security
Workshop on Network Security
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Risk Management for LLMs
Risk Management for LLMs
More from Mayank Dhiman
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Mayank Dhiman
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Mayank Dhiman
Breaking Fraud & Bot Detection Solutions
Breaking Fraud & Bot Detection Solutions
Mayank Dhiman
Automation Attacks At Scale
Automation Attacks At Scale
Mayank Dhiman
Helping People Walk the Narrow Path
Helping People Walk the Narrow Path
Mayank Dhiman
Pyongyang Fortress
Pyongyang Fortress
Mayank Dhiman
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Mayank Dhiman
Sybil Account Detection in OSN
Sybil Account Detection in OSN
Mayank Dhiman
Liar Buyer Fraud, and How to Curb It
Liar Buyer Fraud, and How to Curb It
Mayank Dhiman
More from Mayank Dhiman
(9)
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot Detection Solutions
Breaking Fraud & Bot Detection Solutions
Automation Attacks At Scale
Automation Attacks At Scale
Helping People Walk the Narrow Path
Helping People Walk the Narrow Path
Pyongyang Fortress
Pyongyang Fortress
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Sybil Account Detection in OSN
Sybil Account Detection in OSN
Liar Buyer Fraud, and How to Curb It
Liar Buyer Fraud, and How to Curb It
Recently uploaded
Human genetics..........................pptx
Human genetics..........................pptx
Silpa
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
Scintica Instrumentation
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
ryanrooker
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Silpa
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
Goa Call Girls High Profile Escorts
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
muralinath2
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
ANSARKHAN96
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
Silpa
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
Suji236384
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
shivanisharma5244
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
Areesha Ahmad
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
DiariAli
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.
Silpa
Site Acceptance Test .
Site Acceptance Test .
Poonam Aher Patil
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
Silpa
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
muralinath2
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
Alex Henderson
Recently uploaded
(20)
Human genetics..........................pptx
Human genetics..........................pptx
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
THE ROLE OF BIOTECHNOLOGY IN THE ECONOMIC UPLIFT.pptx
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.
Site Acceptance Test .
Site Acceptance Test .
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
Breaking and Fixing Content-Based Filtering
1.
Breaking and Fixing
Content- Based Filtering Mayank Dhiman Markus Jakobsson Ting-Fang Yen Stealth Security Agari/ZapFraud DataVisor
2.
3.
4.
Hi John CHANGE PASSWORD https://bit.ly/1PibSU0 Slick
logos
5.
6.
7.
Content Based Filtering •
Volume • Reputation • Content Signature • Scam vs Spam
8.
Rise of Targeted
Attacks • Use of Legitimate Infrastructure • Increase in Attacker Sophistication • Low Volume
9.
Homograph Attack • Exploit
Gap in Human & Machine “parsing” • (Ab)use Unicode
10.
Homograph Attack • Circumvents
Signature-based Filters • ML models trained on “expected input”
11.
Experiment • Map of
confusables (67 in total) • Transformer Script • Setup accounts • Send & Receive Emails
12.
Results
13.
Detection Strategies • Find
“Suspect” Combination of Character Sets • Map everything to one Character Set • Count # of transitions of Character Sets and assign Risk Score: – High (Words) – Low (Sentences)
14.
Limitations/Future Work • Study
the effect of fonts, screen size, email reader • Repeat for other languages
15.
Questions?
Download now