Skip to main content

Showing 1–5 of 5 results for author: Arikkat, D R

.
  1. arXiv:2503.15866  [pdf, other

    cs.CR

    DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

    Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti

    Abstract: The widespread adoption of Android devices for sensitive operations like banking and communication has made them prime targets for cyber threats, particularly Advanced Persistent Threats (APT) and sophisticated malware attacks. Traditional malware detection methods rely on binary classification, failing to provide insights into adversarial Tactics, Techniques, and Procedures (TTPs). Understanding… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  2. arXiv:2411.05442  [pdf, other

    cs.IR

    IntellBot: Retrieval Augmented LLM Chatbot for Cyber Threat Knowledge Delivery

    Authors: Dincy R. Arikkat, Abhinav M., Navya Binu, Parvathi M., Navya Biju, K. S. Arunima, Vinod P., Rafidha Rehiman K. A., Mauro Conti

    Abstract: In the rapidly evolving landscape of cyber security, intelligent chatbots are gaining prominence. Artificial Intelligence, Machine Learning, and Natural Language Processing empower these chatbots to handle user inquiries and deliver threat intelligence. This helps cyber security knowledge readily available to both professionals and the public. Traditional rule-based chatbots often lack flexibility… ▽ More

    Submitted 8 November, 2024; originally announced November 2024.

  3. arXiv:2406.14102  [pdf, other

    cs.CR

    SeCTIS: A Framework to Secure CTI Sharing

    Authors: Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Vinod P

    Abstract: The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  4. arXiv:2311.08807  [pdf, other

    cs.CR

    NLP-Based Techniques for Cyber Threat Intelligence

    Authors: Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti

    Abstract: In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  5. arXiv:2306.16087  [pdf, other

    cs.CR

    Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

    Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti

    Abstract: Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first use a convolutional neural network to classif… ▽ More

    Submitted 28 June, 2023; originally announced June 2023.