Skip to main content

Showing 1–10 of 10 results for author: Chiba, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.10110  [pdf, other

    cs.CR

    ScamFerret: Detecting Scam Websites Autonomously with Large Language Models

    Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba

    Abstract: With the rise of sophisticated scam websites that exploit human psychological vulnerabilities, distinguishing between legitimate and scam websites has become increasingly challenging. This paper presents ScamFerret, an innovative agent system employing a large language model (LLM) to autonomously collect and analyze data from a given URL to determine whether it is a scam. Unlike traditional machin… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

    Comments: Accepted for publication at DIMVA 2025

  2. DomainHarvester: Harvesting Infrequently Visited Yet Trustworthy Domain Names

    Authors: Daiki Chiba, Hiroki Nakano, Takashi Koide

    Abstract: In cybersecurity, allow lists play a crucial role in distinguishing safe websites from potential threats. Conventional methods for compiling allow lists, focusing heavily on website popularity, often overlook infrequently visited legitimate domains. This paper introduces DomainHarvester, a system aimed at generating allow lists that include trustworthy yet infrequently visited domains. By adopting… ▽ More

    Submitted 11 February, 2025; v1 submitted 2 October, 2024; originally announced October 2024.

    Comments: Originally presented at IEEE CCNC 2025. An extended version of this work has been published in IEEE Access: https://doi.org/10.1109/ACCESS.2025.3539882

  3. DomainDynamics: Lifecycle-Aware Risk Timeline Construction for Domain Names

    Authors: Daiki Chiba, Hiroki Nakano, Takashi Koide

    Abstract: The persistent threat posed by malicious domain names in cyber-attacks underscores the urgent need for effective detection mechanisms. Traditional machine learning methods, while capable of identifying such domains, often suffer from high false positive and false negative rates due to their extensive reliance on historical data. Conventional approaches often overlook the dynamic nature of domain n… ▽ More

    Submitted 20 February, 2025; v1 submitted 2 October, 2024; originally announced October 2024.

    Comments: Originally presented at IEEE CCNC 2025. An extended version of this work has been published in Computers & Security, 2025

  4. DomainLynx: Leveraging Large Language Models for Enhanced Domain Squatting Detection

    Authors: Daiki Chiba, Hiroki Nakano, Takashi Koide

    Abstract: Domain squatting poses a significant threat to Internet security, with attackers employing increasingly sophisticated techniques. This study introduces DomainLynx, an innovative compound AI system leveraging Large Language Models (LLMs) for enhanced domain squatting detection. Unlike existing methods focusing on predefined patterns for top-ranked domains, DomainLynx excels in identifying novel squ… ▽ More

    Submitted 13 February, 2025; v1 submitted 2 October, 2024; originally announced October 2024.

    Comments: Originally presented at IEEE CCNC 2025. An extended version of this work has been published in IEEE Access: https://doi.org/10.1109/ACCESS.2025.3542036

    Journal ref: D. Chiba, H. Nakano, and T. Koide, "DomainLynx: Advancing LLM Techniques for Robust Domain Squatting Detection," IEEE Access, 2025

  5. arXiv:2402.18093  [pdf, other

    cs.CR

    ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: The proliferation of phishing sites and emails poses significant challenges to existing cybersecurity efforts. Despite advances in malicious email filters and email security protocols, problems with oversight and false positives persist. Users often struggle to understand why emails are flagged as potentially fraudulent, risking the possibility of missing important communications or mistakenly tru… ▽ More

    Submitted 23 August, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: Accepted at SecureComm 2024

  6. PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: Domain squatting is a technique used by attackers to create domain names for phishing sites. In recent phishing attempts, we have observed many domain names that use multiple techniques to evade existing methods for domain squatting. These domain names, which we call generated squatting domains (GSDs), are quite different in appearance from legitimate domain names and do not contain brand names, m… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Accepted at ACSAC 2023

  7. arXiv:2306.05816  [pdf, other

    cs.CR

    Detecting Phishing Sites Using ChatGPT

    Authors: Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba

    Abstract: The emergence of Large Language Models (LLMs), including ChatGPT, is having a significant impact on a wide range of fields. While LLMs have been extensively researched for tasks such as code generation and text synthesis, their application in detecting malicious web content, particularly phishing sites, has been largely unexplored. To combat the rising tide of cyber attacks due to the misuse of LL… ▽ More

    Submitted 13 February, 2025; v1 submitted 9 June, 2023; originally announced June 2023.

  8. arXiv:2303.15847  [pdf, other

    cs.CR cs.SI

    Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts

    Authors: Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto

    Abstract: The rise in phishing attacks via e-mail and short message service (SMS) has not slowed down at all. The first thing we need to do to combat the ever-increasing number of phishing attacks is to collect and characterize more phishing cases that reach end users. Without understanding these characteristics, anti-phishing countermeasures cannot evolve. In this study, we propose an approach using Twitte… ▽ More

    Submitted 6 June, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: Accepted at the 18th International Conference on Availability, Reliability and Security (ARES 2023)

  9. arXiv:2102.05290  [pdf, other

    cs.CY cs.CR

    A First Look at COVID-19 Domain Names: Origin and Implications

    Authors: Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori

    Abstract: This work takes a first look at domain names related to COVID-19 (Cov19doms in short), using a large-scale registered Internet domain name database, which accounts for 260M of distinct domain names registered for 1.6K of distinct top-level domains. We extracted 167K of Cov19doms that have been registered between the end of December 2019 and the end of September 2020. We attempt to answer the follo… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: 9 pages, 4 figures, 4 tables. Accepted at the Passive and Active Measurement Conference 2021 (PAM 2021)

  10. arXiv:1909.07539  [pdf, other

    cs.CR cs.NI

    ShamFinder: An Automated Framework for Detecting IDN Homographs

    Authors: Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto

    Abstract: The internationalized domain name (IDN) is a mechanism that enables us to use Unicode characters in domain names. The set of Unicode characters contains several pairs of characters that are visually identical with each other; e.g., the Latin character 'a' (U+0061) and Cyrillic character 'a' (U+0430). Visually identical characters such as these are generally known as homoglyphs. IDN homograph attac… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: 16 pages, 12 figures, 14 tables. Proceedings of 19th ACM Internet Measurement Conference (IMC 2019)