Skip to main content

Showing 1–4 of 4 results for author: Fukushi, N

.
  1. arXiv:2402.18093  [pdf, other

    cs.CR

    ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: The proliferation of phishing sites and emails poses significant challenges to existing cybersecurity efforts. Despite advances in malicious email filters and email security protocols, problems with oversight and false positives persist. Users often struggle to understand why emails are flagged as potentially fraudulent, risking the possibility of missing important communications or mistakenly tru… ▽ More

    Submitted 23 August, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: Accepted at SecureComm 2024

  2. PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: Domain squatting is a technique used by attackers to create domain names for phishing sites. In recent phishing attempts, we have observed many domain names that use multiple techniques to evade existing methods for domain squatting. These domain names, which we call generated squatting domains (GSDs), are quite different in appearance from legitimate domain names and do not contain brand names, m… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Accepted at ACSAC 2023

  3. arXiv:2306.05816  [pdf, other

    cs.CR

    Detecting Phishing Sites Using ChatGPT

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: The emergence of Large Language Models (LLMs), including ChatGPT, is having a significant impact on a wide range of fields. While LLMs have been extensively researched for tasks such as code generation and text synthesis, their application in detecting malicious web content, particularly phishing sites, has been largely unexplored. To combat the rising tide of cyber attacks due to the misuse of LL… ▽ More

    Submitted 13 February, 2025; v1 submitted 9 June, 2023; originally announced June 2023.

  4. arXiv:2303.15847  [pdf, other

    cs.CR cs.SI

    Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts

    Authors: Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto

    Abstract: The rise in phishing attacks via e-mail and short message service (SMS) has not slowed down at all. The first thing we need to do to combat the ever-increasing number of phishing attacks is to collect and characterize more phishing cases that reach end users. Without understanding these characteristics, anti-phishing countermeasures cannot evolve. In this study, we propose an approach using Twitte… ▽ More

    Submitted 6 June, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: Accepted at the 18th International Conference on Availability, Reliability and Security (ARES 2023)