Nabil Hossain
Bard College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nabil Hossain.
european symposium on research in computer security | 2012
Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain
Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Email is still the most commonly used medium to launch phishing attacks [1]. In this paper, we present a comprehensive natural language based scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Our scheme utilizes all the information present in an email, namely, the header, the links and the text in the body. Although it is obvious that a phishing email is designed to elicit an action from the intended victim, none of the existing detection schemes use this fact to identify phishing emails. Our detection protocol is designed specifically to distinguish between “actionable” and “informational” emails. To this end, we incorporate natural language techniques in phishing detection. We also utilize contextual information, when available, to detect phishing: we study the problem of phishing detection within the contextual confines of the user’s email box and demonstrate that context plays an important role in detection. To the best of our knowledge, this is the first scheme that utilizes natural language techniques and contextual information to detect phishing. We show that our scheme outperforms existing phishing detection schemes. Finally, our protocol detects phishing at the email level rather than detecting masqueraded websites. This is crucial to prevent the victim from clicking any harmful links in the email. Our implementation called PhishNet-NLP, operates between a user’s mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the inbox.
international conference on information security and cryptology | 2013
Rakesh M. Verma; Nabil Hossain
In a phishing attack, an unsuspecting victim is lured, typically via an email, to a web site designed to steal sensitive information such as bank/credit card account numbers, login information for accounts, etc. Each year Internet users lose billions of dollars to this scourge. In this paper, we present a general semantic feature selection method for text problems based on the statistical t-test and WordNet, and we show its effectiveness on phishing email detection by designing classifiers that combine semantics and statistics in analyzing the text in the email. Our feature selection method is general and useful for other applications involving text-based analysis as well. Our email body-text-only classifier achieves more than 95 % accuracy on detecting phishing emails with a false positive rate of 2.24 %. Due to its use of semantics, our feature selection method is robust against adaptive attacks and avoids the problem of frequent retraining needed by machine learning classifiers.
availability, reliability and security | 2012
Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain
Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Among the many possible communication channels, electronic mail still remains the most commonly used medium to launch phishing attacks. In this paper, we present a two dimensional approach to detecting phishing emails. We devise two independent, unsupervised classifiers, namely the link and header classifiers, and two combinations of these classifiers. We show that our schemes significantly outperform the previous unsupervised and supervised phishing detection schemes for emails in the literature. We also utilize contextual information, when available, to detect phishing. Finally, our protocol is designed to detect phishing at the email level rather than detecting fraudulent, masqueraded websites. Our implementation framework called PhishSnag, operates between a users mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the inbox.
ACM Communications in Computer Algebra | 2014
James Belk; Nabil Hossain; Francesco Matucci; Robert W. McGrail
We present an efficient implementation of the solution to the conjugacy problem in Thompsons group F. This algorithm checks for conjugacy by constructing and comparing directed graphs called strand diagrams. We provide a description of our solution algorithm, including the data structure that represents strand diagrams and supports simplifications.
symbolic and numeric algorithms for scientific computing | 2013
Nabil Hossain; Robert W. McGrail; James Belk; Francesco Matucci
We present an efficient implementation of the solution to the conjugacy problem in Thompsons group F, a certain infinite group whose elements are piecewise-linear homeomorphisms of the unit interval. This algorithm checks for conjugacy by constructing and comparing directed graphs called strand diagrams. We provide a comprehensive description of our solution algorithm, including the data structure that stores strand diagrams and methods to simplify them. We prove that our algorithm theoretically achieves a linear time bound in the size of the input, and we present a quadratic time working solution.
Archive | 2013
Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain
arXiv: Artificial Intelligence | 2016
Nabil Hossain; Tianran Hu; Roghayeh Feizi; Ann Marie White; Jiebo Luo; Henry A. Kautz
international conference on weblogs and social media | 2016
Nabil Hossain; Tianran Hu; Roghayeh Feizi; Ann Marie White; Jiebo Luo; Henry A. Kautz
international conference on weblogs and social media | 2018
Nabil Hossain; Thanh Tran; Henry A. Kautz
arXiv: Computers and Society | 2018
Rijul Magu; Nabil Hossain; Henry Alexander Kautz