TAPE aims to address those critical gaps by developing Machine Learning (ML) software to support human security experts in their daily effort to identify phishing campaigns within the reported email alerts from Microsoft 365 Defender and prioritise the response. It also enables the security team to proactively identify new campaign traits and update their Microsoft Sentinel rules periodically.
emails daily
system blocked/alerted
bypass defence
PhishCade: uncover email phishing campaigns.
PhishTrace: Explainable AI to identify attackers' targets within the campaigns.
Domain Intelligence on Trust (DoITrust): graph neural network to reveal untrusted domains.
Cognitive Deception Detector (CDD): Linguistic & cognitive similarities for deceptive web domains.
July 2022
2010's
Very promissing results on machine intelligence are seen using Artificial Intelligence and Machine Learning.
2000's
Start of more targeted cyberattacks such as credit cards and passwords stealing. The attacks are now extended to secure and sensitive government and business information.
1990's
Appearance of newer types of viruses such as 'I LOVE YOU' and Melissa infected tens of millions of computers, causing a worldwide failure of email systems. It led to the creation of antivirus industries.
1970's
Robert Thomas created Creeper, the first computer worm that could move in a network, leaving behind a trail of “I’M THE CREEPER: CATCH ME IF YOU CAN” message.
“The West Australian Security Operation Centre (WASOC) within the Department of Premier and Cabinet is in the process of deploying and testing the threat hunting tool. The WA Government is pleased to be the first user of the tool and is looking forward to determining the tool’s capability to detect threats within the logs."