Submit Search
Upload
Breaking and Fixing Content-Based Filtering
•
Download as PPTX, PDF
•
1 like
•
175 views
M
Mayank Dhiman
Follow
Paper resented at APWG's eCrime 2017 conference in Scottsdale, Arizona
Read less
Read more
Science
Report
Share
Report
Share
1 of 15
Download now
Recommended
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
Winning the Big Data SPAM Challenge__HadoopSummit2010
Winning the Big Data SPAM Challenge__HadoopSummit2010
Yahoo Developer Network
Regular Expression Denial of Service RegexDoS
Regular Expression Denial of Service RegexDoS
Michael Hidalgo
Httpillage lascon-2015
Httpillage lascon-2015
forcedrequest
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
Securing Passwords
Securing Passwords
Mandeep Singh
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
Recommended
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
Winning the Big Data SPAM Challenge__HadoopSummit2010
Winning the Big Data SPAM Challenge__HadoopSummit2010
Yahoo Developer Network
Regular Expression Denial of Service RegexDoS
Regular Expression Denial of Service RegexDoS
Michael Hidalgo
Httpillage lascon-2015
Httpillage lascon-2015
forcedrequest
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Tasnim Alasali
Securing Passwords
Securing Passwords
Mandeep Singh
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
SparkCognition
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
DNIF
Ready set hack
Ready set hack
GDSCBVCOENM
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
FACE
Talos
Talos
Muhammad ilyas
What is Ethical Hacking?
What is Ethical Hacking?
Dignitas Digital Pvt. Ltd.
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Ivo Andreev
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
SOASTA
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Tammy Everts
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Pro Mrkt
Security Code Review 101
Security Code Review 101
Paul Ionescu
Workshop on Network Security
Workshop on Network Security
UC San Diego
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Achievers Tech
Risk Management for LLMs
Risk Management for LLMs
Sri Ambati
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Mayank Dhiman
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Mayank Dhiman
More Related Content
Similar to Breaking and Fixing Content-Based Filtering
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
SparkCognition
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
DNIF
Ready set hack
Ready set hack
GDSCBVCOENM
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Todd Benson (I.T. SPECIALIST and I.T. SECURITY)
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
FACE
Talos
Talos
Muhammad ilyas
What is Ethical Hacking?
What is Ethical Hacking?
Dignitas Digital Pvt. Ltd.
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Ivo Andreev
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
SOASTA
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Tammy Everts
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Pro Mrkt
Security Code Review 101
Security Code Review 101
Paul Ionescu
Workshop on Network Security
Workshop on Network Security
UC San Diego
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Achievers Tech
Risk Management for LLMs
Risk Management for LLMs
Sri Ambati
Similar to Breaking and Fixing Content-Based Filtering
(20)
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
Ready set hack
Ready set hack
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Application Context and Discovering XSS without
Application Context and Discovering XSS without
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Formal, Executable Semantics of Web Languages: JavaScript and PHP
Talos
Talos
What is Ethical Hacking?
What is Ethical Hacking?
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Velocity 2016 Speaking Session - Using Machine Learning to Determine Drivers ...
Using machine learning to determine drivers of bounce and conversion
Using machine learning to determine drivers of bounce and conversion
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Security Code Review 101
Security Code Review 101
Workshop on Network Security
Workshop on Network Security
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
Risk Management for LLMs
Risk Management for LLMs
More from Mayank Dhiman
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Mayank Dhiman
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Mayank Dhiman
Breaking Fraud & Bot Detection Solutions
Breaking Fraud & Bot Detection Solutions
Mayank Dhiman
Automation Attacks At Scale
Automation Attacks At Scale
Mayank Dhiman
Helping People Walk the Narrow Path
Helping People Walk the Narrow Path
Mayank Dhiman
Pyongyang Fortress
Pyongyang Fortress
Mayank Dhiman
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Mayank Dhiman
Sybil Account Detection in OSN
Sybil Account Detection in OSN
Mayank Dhiman
Liar Buyer Fraud, and How to Curb It
Liar Buyer Fraud, and How to Curb It
Mayank Dhiman
More from Mayank Dhiman
(9)
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot Detection Solutions
Breaking Fraud & Bot Detection Solutions
Automation Attacks At Scale
Automation Attacks At Scale
Helping People Walk the Narrow Path
Helping People Walk the Narrow Path
Pyongyang Fortress
Pyongyang Fortress
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Spy vs SPI: Hacking the Stratus ADS-B Transponder
Sybil Account Detection in OSN
Sybil Account Detection in OSN
Liar Buyer Fraud, and How to Curb It
Liar Buyer Fraud, and How to Curb It
Recently uploaded
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
Alex Henderson
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
Areesha Ahmad
Pteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecycle
Cherry
Site specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdf
Cherry
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
Scintica Instrumentation
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
Cherry
Concept of gene and Complementation test.pdf
Concept of gene and Complementation test.pdf
Cherry
Plasmid: types, structure and functions.
Plasmid: types, structure and functions.
Cherry
Understanding Partial Differential Equations: Types and Solution Methods
Understanding Partial Differential Equations: Types and Solution Methods
imroshankoirala
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptx
RenuJangid3
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Cherry
COMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demerits
Cherry
Energy is the beat of life irrespective of the domains. ATP- the energy curre...
Energy is the beat of life irrespective of the domains. ATP- the energy curre...
Nistarini College, Purulia (W.B) India
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
Sérgio Sacani
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
muralinath2
PODOCARPUS...........................pptx
PODOCARPUS...........................pptx
Cherry
GBSN - Microbiology (Unit 4) Concept of Asepsis
GBSN - Microbiology (Unit 4) Concept of Asepsis
Areesha Ahmad
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
Cherry
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cherry
GBSN - Biochemistry (Unit 3) Metabolism
GBSN - Biochemistry (Unit 3) Metabolism
Areesha Ahmad
Recently uploaded
(20)
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
GBSN - Biochemistry (Unit 2) Basic concept of organic chemistry
Pteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecycle
Site specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdf
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
(May 9, 2024) Enhanced Ultrafast Vector Flow Imaging (VFI) Using Multi-Angle ...
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
Concept of gene and Complementation test.pdf
Concept of gene and Complementation test.pdf
Plasmid: types, structure and functions.
Plasmid: types, structure and functions.
Understanding Partial Differential Equations: Types and Solution Methods
Understanding Partial Differential Equations: Types and Solution Methods
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptx
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
COMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demerits
Energy is the beat of life irrespective of the domains. ATP- the energy curre...
Energy is the beat of life irrespective of the domains. ATP- the energy curre...
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
PODOCARPUS...........................pptx
PODOCARPUS...........................pptx
GBSN - Microbiology (Unit 4) Concept of Asepsis
GBSN - Microbiology (Unit 4) Concept of Asepsis
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
GBSN - Biochemistry (Unit 3) Metabolism
GBSN - Biochemistry (Unit 3) Metabolism
Breaking and Fixing Content-Based Filtering
1.
Breaking and Fixing
Content- Based Filtering Mayank Dhiman Markus Jakobsson Ting-Fang Yen Stealth Security Agari/ZapFraud DataVisor
2.
3.
4.
Hi John CHANGE PASSWORD https://bit.ly/1PibSU0 Slick
logos
5.
6.
7.
Content Based Filtering •
Volume • Reputation • Content Signature • Scam vs Spam
8.
Rise of Targeted
Attacks • Use of Legitimate Infrastructure • Increase in Attacker Sophistication • Low Volume
9.
Homograph Attack • Exploit
Gap in Human & Machine “parsing” • (Ab)use Unicode
10.
Homograph Attack • Circumvents
Signature-based Filters • ML models trained on “expected input”
11.
Experiment • Map of
confusables (67 in total) • Transformer Script • Setup accounts • Send & Receive Emails
12.
Results
13.
Detection Strategies • Find
“Suspect” Combination of Character Sets • Map everything to one Character Set • Count # of transitions of Character Sets and assign Risk Score: – High (Words) – Low (Sentences)
14.
Limitations/Future Work • Study
the effect of fonts, screen size, email reader • Repeat for other languages
15.
Questions?
Download now