Rohan Amin

New York City Metropolitan Area Contact Info
20K followers 500+ connections

Join to view profile

About

Dr. Rohan Amin is Chief Product Officer of Chase, leading product, design, and data and…

Articles by Rohan

Activity

Join now to see all activity

Experience & Education

  • JPMorgan Chase & Co.

View Rohan’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • Project Management Professional (PMP)

    Project Management Institute

    Issued Expires

Publications

  • Detecting Targeted Malicious Email

    IEEE Security and Privacy

    Targeted malicious emails (TME) for computer network exploitation have become more insidious and more widely documented in recent years. Beyond spam or phishing designed to trick users into revealing personal information, TME can exploit computer networks and gather sensitive information. They can consist of coordinated and persistent campaigns that can span years. A new email-filtering technique based on email's persistent-threat and recipient-oriented features with a random forest classifier…

    Targeted malicious emails (TME) for computer network exploitation have become more insidious and more widely documented in recent years. Beyond spam or phishing designed to trick users into revealing personal information, TME can exploit computer networks and gather sensitive information. They can consist of coordinated and persistent campaigns that can span years. A new email-filtering technique based on email's persistent-threat and recipient-oriented features with a random forest classifier outperforms two traditional detection methods, SpamAssassin and ClamAV, while maintaining reasonable false positive rates.

    Other authors
    See publication
  • Journal of Network Forensics

    Other authors
  • Leading Issues in Information Warfare & Security Research

    Academic Publishing International

    Edited by Julie Ryan

    As virtually every aspect of society becomes increasingly dependent on information and communications technology, so our vulnerability to attacks on this technology increases. This is a major theme of this collection of leading edge research papers. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware etc., then technology may also be used positively in the pursuit of society’s…

    Edited by Julie Ryan

    As virtually every aspect of society becomes increasingly dependent on information and communications technology, so our vulnerability to attacks on this technology increases. This is a major theme of this collection of leading edge research papers. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware etc., then technology may also be used positively in the pursuit of society’s objectives. Specific topics in the collection include Cryptography and Steganography, Cyber Antagonism, Information Sharing Between Government and Industry as a Weapon, Terrorist Use of the Internet, War and Ethics in Cyberspace to name just a few.

    The papers in this book take a wide ranging look at the more important issues surrounding the use of information and communication technology as it applies to the security of vital systems that can have a major impact on the functionality of our society. This book includes leading contributions to research in this field from 9 different countries and an introduction to the subject by Professor Julie Ryan from George Washington University in the USA.

    Other authors
    See publication
  • Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

    6th International Conference on Information Warfare and Security

    Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for certain actors. A new class of threats, appropriately dubbed the "Advanced Persistent Threat'' (APT), represents well-resourced and trained adversaries that…

    Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for certain actors. A new class of threats, appropriately dubbed the "Advanced Persistent Threat'' (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive economic, proprietary, or national security information. These adversaries accomplish their goals using advanced tools and techniques designed to defeat most conventional computer network defense mechanisms. Network defense techniques which leverage knowledge about these adversaries can create an intelligence feedback loop, enabling defenders to establish a state of information superiority which decreases the adversary's likelihood of success with each subsequent intrusion attempt. Using a kill chain model to describe phases of intrusions, mapping adversary kill chain indicators to defender courses of action, identifying patterns that link individual intrusions into broader campaigns, and understanding the iterative nature of intelligence gathering form the basis of intelligence-driven computer network defense (CND). Institutionalization of this approach reduces the likelihood of adversary success, informs network defense investment and resource prioritization, and yields relevant metrics of performance and effectiveness. The evolution of advanced persistent threats necessitates an intelligence-based model because in this model the defenders mitigate not just vulnerability, but the threat component of risk, too.

    Other authors
    See publication
  • Detecting targeted malicious email through supervised classification of persistent threat and recipient oriented features

    ProQuest® Dissertations & Theses

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent…

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent attack campaigns that can span years. This dissertation surveys and categorizes existing email filtering techniques, proposes and implements new methods for detecting targeted malicious email and compares these newly developed techniques to traditional detection methods. Current research and commercial methods for detecting illegitimate email are limited to addressing Internet scale email abuse, such as spam, but not focused on addressing targeted malicious emails. Furthermore, conventional tools such as anti-virus are vulnerability focused examining only the binary code of an email but ignoring all relevant contextual metadata.

    ...

    See publication

Recommendations received

2 people have recommended Rohan

Join now to view

More activity by Rohan

View Rohan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Rohan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Rohan Amin in United States

Add new skills with these courses