Author Archives: calvin

new workshop paper “Leveraging Controlled Information Sharing for Botnet Activity Detection”

We have published a new paper “Leveraging Controlled Information Sharing for Botnet Activity Detection” in the Workshop on Traffic Measurements for Cybersecurity (WTMC 2018) in Budapest, Hungary, co-located with ACM SIGCOMM 2018. From the abstract of our paper: Today’s malware … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

timefind v1.0.3 released with recursion support

timefind v1.0.3 has been released (available at https://ant.isi.edu/software/timefind/). indexer and timefind will handle the indexing and selection of multiple network data types given some time range. Major changes in 1.0.3 include: new file processors for .csv, .fsdb, syslog, and BGP/MRT … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

new workshop paper “AuntieTuna: Personalized Content-based Phishing Detection” in USEC 2016

The paper “AuntieTuna: Personalized Content-based Phishing Detection” will appear at the NDSS Usable Security Workshop on February 21, 2016 in San Diego, CA, USA (available at https://www.isi.edu/~calvin/papers/Ardi16a.pdf). From the abstract: Phishing sites masquerade as copies of legitimate sites (“targets”) to … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

timefind v1.0.2.2 released

timefind v1.0.2.2 has been released (available at https://ant.isi.edu/software/timefind/). Scientists at Los Alamos National Laboratory and at USC/ISI have developed two tools to handle indexing and selection of multiple network data types: indexer and timefind. Most of us have processed large … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

new technical report “Poster: Lightweight Content-based Phishing Detection”

We released a new technical report “Poster: Lightweight Content-based Phishing Detection”, ISI-TR-698, available at http://www.isi.edu/publications/trpublic/files/tr-698.pdf. The poster abstract and poster (included as part of the technical report) appeared at the poster session at the 36th IEEE Symposium on Security and Privacy … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

new workshop paper “Privacy Principles for Sharing Cyber Security Data” in IWPE 15

The paper “Privacy Principles for Sharing Cyber Security Data” (available at https://www.isi.edu/~calvin/papers/Fisk15a.pdf) will appear at the International Workshop on Privacy Engineering (co-located with IEEE Symposium on Security and Privacy) on May 21, 2015 in San Jose, California. From the abstract: … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Leave a comment

new technical report “Web-scale Content Reuse Detection (extended)”

We released a new technical report “Web-scale Content Reuse Detection (extended)”, ISI-TR-2014-692, available at http://www.isi.edu/publications/trpublic/files/tr-692.pdf. From the abstract: With the vast amount of accessible, online content, it is not surprising that unscrupulous entities “borrow” from the web to provide filler for … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment