About
Articles by Rohan
Activity
-
🎉 Here's to an amazing Sunday spent celebrating my wife Dilani’s birthday - our first together as a married couple! 🎂 Family and relationships are…
🎉 Here's to an amazing Sunday spent celebrating my wife Dilani’s birthday - our first together as a married couple! 🎂 Family and relationships are…
Liked by Rohan Amin
-
Did you know over 90% of most flights are flown with the autopilot engaged? That’s how my colleague, Roman Eisenberg, and I started the…
Did you know over 90% of most flights are flown with the autopilot engaged? That’s how my colleague, Roman Eisenberg, and I started the…
Liked by Rohan Amin
-
At JPMorganChase, we believe that innovation is key to our success. Celebrating the incredible achievements and expertise of our colleagues, tens of…
At JPMorganChase, we believe that innovation is key to our success. Celebrating the incredible achievements and expertise of our colleagues, tens of…
Liked by Rohan Amin
Experience & Education
Licenses & Certifications
-
Project Management Professional (PMP)
Project Management Institute
Issued Expires
Publications
-
Detecting Targeted Malicious Email
IEEE Security and Privacy
Targeted malicious emails (TME) for computer network exploitation have become more insidious and more widely documented in recent years. Beyond spam or phishing designed to trick users into revealing personal information, TME can exploit computer networks and gather sensitive information. They can consist of coordinated and persistent campaigns that can span years. A new email-filtering technique based on email's persistent-threat and recipient-oriented features with a random forest classifier…
Targeted malicious emails (TME) for computer network exploitation have become more insidious and more widely documented in recent years. Beyond spam or phishing designed to trick users into revealing personal information, TME can exploit computer networks and gather sensitive information. They can consist of coordinated and persistent campaigns that can span years. A new email-filtering technique based on email's persistent-threat and recipient-oriented features with a random forest classifier outperforms two traditional detection methods, SpamAssassin and ClamAV, while maintaining reasonable false positive rates.
Other authorsSee publication -
Leading Issues in Information Warfare & Security Research
Academic Publishing International
Edited by Julie Ryan
As virtually every aspect of society becomes increasingly dependent on information and communications technology, so our vulnerability to attacks on this technology increases. This is a major theme of this collection of leading edge research papers. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware etc., then technology may also be used positively in the pursuit of society’s…Edited by Julie Ryan
As virtually every aspect of society becomes increasingly dependent on information and communications technology, so our vulnerability to attacks on this technology increases. This is a major theme of this collection of leading edge research papers. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware etc., then technology may also be used positively in the pursuit of society’s objectives. Specific topics in the collection include Cryptography and Steganography, Cyber Antagonism, Information Sharing Between Government and Industry as a Weapon, Terrorist Use of the Internet, War and Ethics in Cyberspace to name just a few.
The papers in this book take a wide ranging look at the more important issues surrounding the use of information and communication technology as it applies to the security of vital systems that can have a major impact on the functionality of our society. This book includes leading contributions to research in this field from 9 different countries and an introduction to the subject by Professor Julie Ryan from George Washington University in the USA.Other authorsSee publication -
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
6th International Conference on Information Warfare and Security
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for certain actors. A new class of threats, appropriately dubbed the "Advanced Persistent Threat'' (APT), represents well-resourced and trained adversaries that…
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for certain actors. A new class of threats, appropriately dubbed the "Advanced Persistent Threat'' (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive economic, proprietary, or national security information. These adversaries accomplish their goals using advanced tools and techniques designed to defeat most conventional computer network defense mechanisms. Network defense techniques which leverage knowledge about these adversaries can create an intelligence feedback loop, enabling defenders to establish a state of information superiority which decreases the adversary's likelihood of success with each subsequent intrusion attempt. Using a kill chain model to describe phases of intrusions, mapping adversary kill chain indicators to defender courses of action, identifying patterns that link individual intrusions into broader campaigns, and understanding the iterative nature of intelligence gathering form the basis of intelligence-driven computer network defense (CND). Institutionalization of this approach reduces the likelihood of adversary success, informs network defense investment and resource prioritization, and yields relevant metrics of performance and effectiveness. The evolution of advanced persistent threats necessitates an intelligence-based model because in this model the defenders mitigate not just vulnerability, but the threat component of risk, too.
Other authorsSee publication -
Detecting targeted malicious email through supervised classification of persistent threat and recipient oriented features
ProQuest® Dissertations & Theses
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent…
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent attack campaigns that can span years. This dissertation surveys and categorizes existing email filtering techniques, proposes and implements new methods for detecting targeted malicious email and compares these newly developed techniques to traditional detection methods. Current research and commercial methods for detecting illegitimate email are limited to addressing Internet scale email abuse, such as spam, but not focused on addressing targeted malicious emails. Furthermore, conventional tools such as anti-virus are vulnerability focused examining only the binary code of an email but ignoring all relevant contextual metadata.
...
Recommendations received
-
LinkedIn User
2 people have recommended Rohan
Join now to viewMore activity by Rohan
-
In Arabic, “Noor” means ray of light. And true to her name, Noor Hassan has created a podcast called “beyond the battlefront” that shines a light on…
In Arabic, “Noor” means ray of light. And true to her name, Noor Hassan has created a podcast called “beyond the battlefront” that shines a light on…
Liked by Rohan Amin
-
My teams are at the epicenter of unlocking the potential of Artificial Intelligence. As head of data technology for Chase, I was really jazzed to…
My teams are at the epicenter of unlocking the potential of Artificial Intelligence. As head of data technology for Chase, I was really jazzed to…
Liked by Rohan Amin
-
Over the last several weeks, I’ve had the pleasure of visiting with Nasdaq team members and investors around the globe. To start, I participated…
Over the last several weeks, I’ve had the pleasure of visiting with Nasdaq team members and investors around the globe. To start, I participated…
Liked by Rohan Amin
-
Every day on the Chase mobile app we’re working to make it easy for 82 million+ customers to manage their financial lives and better understand their…
Every day on the Chase mobile app we’re working to make it easy for 82 million+ customers to manage their financial lives and better understand their…
Liked by Rohan Amin
-
Just pretty amazing to see this piece by Shashank Joshi in print with Recorded Future leading the way on next generation intelligence. 15 years of…
Just pretty amazing to see this piece by Shashank Joshi in print with Recorded Future leading the way on next generation intelligence. 15 years of…
Liked by Rohan Amin
-
When I first started my career, I thought I had to be the one with all the answers all the time. Over the years, I've learned that you don't have to…
When I first started my career, I thought I had to be the one with all the answers all the time. Over the years, I've learned that you don't have to…
Liked by Rohan Amin
-
I had a great time hosting the Product & Technology and Experience (PXT) Senior Leaders Conference in Nashville, TN alongside Rohan Amin, Oron Gill…
I had a great time hosting the Product & Technology and Experience (PXT) Senior Leaders Conference in Nashville, TN alongside Rohan Amin, Oron Gill…
Liked by Rohan Amin
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rohan Amin in United States
-
Rohan Amin
Mathematical Economics | Concentration in Finance and Data Analysis | Pickle Ball and Soccer Lover
-
Rohan Amin
Student at Princeton University
-
Rohan Amin
Product Manager at Phreesia
-
Rohan Amin
Area Manager at Amazon
20 others named Rohan Amin in United States are on LinkedIn
See others named Rohan Amin