Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nabil Hossain is active.

Publication


Featured researches published by Nabil Hossain.


european symposium on research in computer security | 2012

Detecting Phishing Emails the Natural Language Way

Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain

Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Email is still the most commonly used medium to launch phishing attacks [1]. In this paper, we present a comprehensive natural language based scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Our scheme utilizes all the information present in an email, namely, the header, the links and the text in the body. Although it is obvious that a phishing email is designed to elicit an action from the intended victim, none of the existing detection schemes use this fact to identify phishing emails. Our detection protocol is designed specifically to distinguish between “actionable” and “informational” emails. To this end, we incorporate natural language techniques in phishing detection. We also utilize contextual information, when available, to detect phishing: we study the problem of phishing detection within the contextual confines of the user’s email box and demonstrate that context plays an important role in detection. To the best of our knowledge, this is the first scheme that utilizes natural language techniques and contextual information to detect phishing. We show that our scheme outperforms existing phishing detection schemes. Finally, our protocol detects phishing at the email level rather than detecting masqueraded websites. This is crucial to prevent the victim from clicking any harmful links in the email. Our implementation called PhishNet-NLP, operates between a user’s mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the inbox.


international conference on information security and cryptology | 2013

Semantic Feature Selection for Text with Application to Phishing Email Detection

Rakesh M. Verma; Nabil Hossain

In a phishing attack, an unsuspecting victim is lured, typically via an email, to a web site designed to steal sensitive information such as bank/credit card account numbers, login information for accounts, etc. Each year Internet users lose billions of dollars to this scourge. In this paper, we present a general semantic feature selection method for text problems based on the statistical t-test and WordNet, and we show its effectiveness on phishing email detection by designing classifiers that combine semantics and statistics in analyzing the text in the email. Our feature selection method is general and useful for other applications involving text-based analysis as well. Our email body-text-only classifier achieves more than 95 % accuracy on detecting phishing emails with a false positive rate of 2.24 %. Due to its use of semantics, our feature selection method is robust against adaptive attacks and avoids the problem of frequent retraining needed by machine learning classifiers.


availability, reliability and security | 2012

Two-Pronged Phish Snagging

Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain

Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Among the many possible communication channels, electronic mail still remains the most commonly used medium to launch phishing attacks. In this paper, we present a two dimensional approach to detecting phishing emails. We devise two independent, unsupervised classifiers, namely the link and header classifiers, and two combinations of these classifiers. We show that our schemes significantly outperform the previous unsupervised and supervised phishing detection schemes for emails in the literature. We also utilize contextual information, when available, to detect phishing. Finally, our protocol is designed to detect phishing at the email level rather than detecting fraudulent, masqueraded websites. Our implementation framework called PhishSnag, operates between a users mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving email for phishing attacks even before reaching the inbox.


ACM Communications in Computer Algebra | 2014

Implementation of a solution to the conjugacy problem in Thompson's group F

James Belk; Nabil Hossain; Francesco Matucci; Robert W. McGrail

We present an efficient implementation of the solution to the conjugacy problem in Thompsons group F. This algorithm checks for conjugacy by constructing and comparing directed graphs called strand diagrams. We provide a description of our solution algorithm, including the data structure that represents strand diagrams and supports simplifications.


symbolic and numeric algorithms for scientific computing | 2013

Deciding Conjugacy in Thompson's Group F in Linear Time

Nabil Hossain; Robert W. McGrail; James Belk; Francesco Matucci

We present an efficient implementation of the solution to the conjugacy problem in Thompsons group F, a certain infinite group whose elements are piecewise-linear homeomorphisms of the unit interval. This algorithm checks for conjugacy by constructing and comparing directed graphs called strand diagrams. We provide a comprehensive description of our solution algorithm, including the data structure that stores strand diagrams and methods to simplify them. We prove that our algorithm theoretically achieves a linear time bound in the size of the input, and we present a quadratic time working solution.


Archive | 2013

AUTOMATIC PHISHING EMAIL DETECTION BASED ON NATURAL LANGUAGE PROCESSING TECHNIQUES

Rakesh M. Verma; Narasimha Shashidhar; Nabil Hossain


arXiv: Artificial Intelligence | 2016

Inferring Fine-grained Details on User Activities and Home Location from Social Media: Detecting Drinking-While-Tweeting Patterns in Communities.

Nabil Hossain; Tianran Hu; Roghayeh Feizi; Ann Marie White; Jiebo Luo; Henry A. Kautz


international conference on weblogs and social media | 2016

Precise Localization of Homes and Activities: Detecting Drinking-While-Tweeting Patterns in Communities

Nabil Hossain; Tianran Hu; Roghayeh Feizi; Ann Marie White; Jiebo Luo; Henry A. Kautz


international conference on weblogs and social media | 2018

Discovering Political Slang in Readers' Comments.

Nabil Hossain; Thanh Tran; Henry A. Kautz


arXiv: Computers and Society | 2018

Analyzing Uncivil Speech Provocation and Implicit Topics in Online Political News.

Rijul Magu; Nabil Hossain; Henry Alexander Kautz

Collaboration


Dive into the Nabil Hossain's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Narasimha Shashidhar

Sam Houston State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiebo Luo

University of Rochester

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tianran Hu

University of Rochester

View shared research outputs
Researchain Logo
Decentralizing Knowledge