Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Paul A. Watters is active.

Publication


Featured researches published by Paul A. Watters.


2010 Second Cybercrime and Trustworthy Computing Workshop | 2010

Authorship Attribution for Twitter in 140 Characters or Less

Robert Layton; Paul A. Watters; Richard Dazeley

Authorship attribution is a growing field, moving from beginnings in linguistics to recent advances in text mining. Through this change came an increase in the capability of authorship attribution methods both in their accuracy and the ability to consider more difficult problems. Research into authorship attribution in the 19th century considered it difficult to determine the authorship of a document of fewer than 1000 words. By the 1990s this values had decreased to less than 500 words and in the early 21st century it was considered possible to determine the authorship of a document in 250 words. The need for this ever decreasing limit is exemplified by the trend towards many shorter communications rather than fewer longer communications, such as the move from traditional multi-page handwritten letters to shorter, more focused emails. This trend has also been shown in online crime, where many attacks such as phishing or bullying are performed using very concise language. Cybercrime messages have long been hosted on Internet Relay Chats (IRCs) which have allowed members to hide behind screen names and connect anonymously. More recently, Twitter and other short message based web services have been used as a hosting ground for online crimes. This paper presents some evaluations of current techniques and identifies some new preprocessing methods that can be used to enable authorship to be determined at rates significantly better than chance for documents of 140 characters or less, a format popularised by the micro-blogging website Twitter1. We show that the SCAP methodology performs extremely well on twitter messages and even with restrictions on the types of information allowed, such as the recipient of directed messages, still perform significantly higher than chance. Further to this, we show that 120 tweets per user is an important threshold, at which point adding more tweets per user gives a small but non-significant increase in accuracy.


2010 Second Cybercrime and Trustworthy Computing Workshop | 2010

Towards Understanding Malware Behaviour by the Extraction of API Calls

Mamoun Alazab; Sitalakshimi Venkataraman; Paul A. Watters

One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus industry are facing a herculean task in extracting payloads hidden within packed executables. It is a common practice to use manual unpacking or static unpacking using some software tools and analyse the application programming interface (API) calls for malware detection. However, extracting these features from the unpacked executables for reverse obfuscation is labour intensive and requires deep knowledge of low-level programming that includes kernel and assembly language. This paper presents an automated method of extracting API call features and analysing them in order to understand their use for malicious purpose. While some research has been conducted in arriving at file birthmarks using API call features and the like, there is a scarcity of work that relates to features in malcodes. To address this gap, we attempt to automatically analyse and classify the behavior of API function calls based on the malicious intent hidden within any packed program. This paper uses four-step methodology for developing a fully automated system to arrive at six main categories of suspicious behavior of API call features.


systems, man and cybernetics | 2004

Statistical and structural approaches to filtering Internet pornography

Wai Han Ho; Paul A. Watters

The WWW is a major source of unintentional exposure to pornography. Current content filtering technology using blacklisting or simple keyword searching is ineffective - todays filters have many false positives and negatives, and require tedious manual updating. This study examined how content filtering of pornographic Web page text, based on structural and statistical analysis, could greatly improve accuracy. Systematic differences between pornographic and nonpornographic Web pages were found, with Bayesian classification yielding 99.1% accuracy in text classification from pornographic and non-pornographic corpora


autonomic and trusted computing | 2009

Detecting Phishing Emails Using Hybrid Features

Liping Ma; Bahadorrezda Ofoghi; Paul A. Watters; S. A. Brown

Phishing emails have been used widely in fraud of financial organizations and customers. Phishing email detection has drawn a lot attention for many researchers and malicious detection devices are installed in email servers. However, phishing has become more and more complicated and sophisticated and attack can bypass the filter set by anti-phishing techniques. In this paper, we present a method to build a robust classifier to detect phishing emails using hybrid features and to select features using information gain. We experiment on 10 cross-validations to build an initial classifier which performs well. The experiment also analyses the quality of each feature using information gain and best feature set is selected after a recursive learning process. Experimental result shows the selected features perform as well as the original features. Finally, we test five machine learning algorithms and compare the performance of each. The result shows that decision tree builds the best classifier.


Human Psychopharmacology-clinical and Experimental | 1997

Caffeine and Cognitive Performance: The Nonlinear Yerkes–Dodson Law

Paul A. Watters; F Martin; Zoltan Schreter

This study presents a test of the Yerkes–Dodson Law (YDL; Yerkes and Dodson, 1908), which is understood to predict a negative quadratic relationship between arousal and performance (‘inverted‐U’ hypothesis), and a lower level of arousal for optimal performance on more difficult tasks than easier tasks (‘task difficulty’ hypothesis). A number of recent studies (e.g. Neiss, 1988) have questioned the validity of the YDL on several grounds: the confusion of theory and model; observed linear arousal–performance relationships; non‐specific definitions of arousal; and poor experimental design. A single‐blind modified version of Andersons (1994) within‐subjects study (N = 10) was performed, utilizing graded cortical arousal manipulations of caffeine (100 mg cumulative dosages to a maximum of 600 mg), and four tests of basic cognitive ability in the procedural alphanumerical domain (with counterbalancing of drug/placebo session and ordering of presentations of tasks). The ‘inverted‐U’ hypothesis was supported in three out of four experimental conditions (easy and difficult numerical, and difficult alphabetical tasks; p < 0·05). No support was found for the task difficulty hypothesis. The results are discussed in terms of the emergence of nonlinearity in neural–cognitive interactions as a fundamental quality of drug–behaviour interactions.


trust security and privacy in computing and communications | 2011

A Survey on Latest Botnet Attack and Defense

Lei Zhang; Shui Yu; Di Wu; Paul A. Watters

A botnet is a group of compromised computers, which are remotely controlled by hackers to launch various network attacks, such as DDoS attack and information phishing. Botnet has become a popular and productive tool behind many cyber attacks. Recently, the owners of some botnets, such as storm worm, torpig and conflicker, are employing fluxing techniques to evade detection. Therefore, the understanding of their fluxing tricks is critical to the success of defending from botnet attacks. Motivated by this, we survey the latest botnet attacks and defenses in this paper. We begin with introducing the principles of fast fluxing (FF) and domain fluxing (DF), and explain how these techniques were employed by botnet owners to fly under the radar. Furthermore, we investigate the state-of-art research on fluxing detection. We also compare and evaluate those fluxing detection methods by multiple criteria. Finally, we discuss future directions on fighting against botnet based attacks.


Perception | 2000

A Comparison of Natural-Image-Based Models of Simple-Cell Coding

Ben Willmore; Paul A. Watters; David J. Tolhurst

Models such as that of Olshausen and Field (O&F, 1997 Vision Research 37 3311–3325) and principal components analysis (PCA) have been used to model simple-cell receptive fields, and to try to elucidate the statistical principles underlying visual coding in area V1. They connect the statistical structure of natural images with the statistical structure of the coding used in V1. The O&F model has created particular interest because the basis functions it produces resemble the receptive fields of simple cells. We evaluate these models in terms of their sparseness and dispersal, both of which have been suggested as desirable for efficient visual coding. However, both attributes have been defined ambiguously in the literature, and we have been obliged to formulate specific definitions in order to allow any comparison between models at all. We find that both attributes are strongly affected by any preprocessing (eg spectral pseudo-whitening or a logarithmic transformation) which is often applied to images before they are analysed by PCA or the O&F model. We also find that measures of sparseness are affected by the size of the filters—PCA filters with small receptive fields appear sparser than PCA filters with larger spatial extent. Finally, normalisation of the means and variances of filters influences measures of dispersal. It is necessary to control for all of these factors before making any comparisons between different models. Having taken these factors into account, we find that the code produced by the O&F model is somewhat sparser than the code produced by PCA. However, the difference is rather smaller than might have been expected, and a measure of dispersal is required to distinguish clearly between the two models.


Natural Language Engineering | 2013

Automated unsupervised authorship analysis using evidence accumulation clustering

Robert Layton; Paul A. Watters; Richard Dazeley

Authorship Analysis aims to extract information about the authorship of documents from features within those documents. Typically, this is performed as a classification task with the aim of identifying the author of a document, given a set of documents of known authorship. Alternatively, unsupervised methods have been developed primarily as visualisation tools to assist the manual discovery of clusters of authorship within a corpus by analysts. However, there is a need in many fields for more sophisticated unsupervised methods to automate the discovery, profiling and organisation of related information through clustering of documents by authorship. An automated and unsupervised methodology for clustering documents by authorship is proposed in this paper. The methodology is named NUANCE, for n -gram Unsupervised Automated Natural Cluster Ensemble. Testing indicates that the derived clusters have a strong correlation to the true authorship of unseen documents.


Natural Language Engineering | 2012

Recentred local profiles for authorship attribution

Robert Layton; Paul A. Watters; Richard Dazeley

Authorship attribution methods aim to determine the author of a document, by using information gathered from a set of documents with known authors. One method of performing this task is to create profiles containing distinctive features known to be used by each author. In this paper, a new method of creating an author or document profile is presented that detects features considered distinctive, compared to normal language usage. This recentreing approach creates more accurate profiles than previous methods, as demonstrated empirically using a known corpus of authorship problems. This method, named recentred local profiles, determines authorship accurately using a simple ‘best matching author’ approach to classification, compared to other methods in the literature. The proposed method is shown to be more stable than related methods as parameter values change. Using a weighted voting scheme, recentred local profiles is shown to outperform other methods in authorship attribution, with an overall accuracy of 69.9% on the ad-hoc authorship attribution competition corpus, representing a significant improvement over related methods.


social informatics | 2012

Cybercrime: The Case of Obfuscated Malware

Mamoun Alazab; Sitalakshmi Venkatraman; Paul A. Watters; Moutaz Alazab; Ammar Alazab

Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well as to detect the threat. The main contribution of this paper is a step towards addressing this by investigating the different techniques adopted by obfuscated malware as they are growingly widespread and increasingly sophisticated with zero-day exploits. In particular, by adopting certain effective detection methods our investigations show how cybercriminals make use of file system vulnerabilities to inject hidden malware into the system. The paper also describes the recent trends of Zeus botnets and the importance of anomaly detection to be employed in addressing the new Zeus generation of malware.

Collaboration


Dive into the Paul A. Watters's collaboration.

Top Co-Authors

Avatar

Robert Layton

Federation University Australia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard Dazeley

Federation University Australia

View shared research outputs
Top Co-Authors

Avatar

Mamoun Alazab

Australian National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

F Martin

University of Newcastle

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mofakharul Islam

Federation University Australia

View shared research outputs
Top Co-Authors

Avatar

Xin-Wen Wu

Federation University Australia

View shared research outputs
Top Co-Authors

Avatar

S. A. Brown

MacDiarmid Institute for Advanced Materials and Nanotechnology

View shared research outputs
Researchain Logo
Decentralizing Knowledge