
TAPE
Threat Automation and Prioritisation of Emails Alerts
What is TAPE?
TAPE aims to address those critical gaps by developing Machine Learning (ML) software to support human security experts in
their daily effort to identify phishing campaigns within the reported email alerts from Microsoft 365 Defender and prioritise the
response. It also enables the security team to proactively identify new campaign traits and update their Microsoft Sentinel rules
periodically.

A Large Organisation
in Australia
760K
emails daily
680K
System bloked/alerted
1K
Bypass defence
TAPE Solution
-
PhishCade: uncover email phishing campaigns.
-
PhishTrace: Explainable AI to identify attackers' targets within the campaigns.
-
Domain Intelligence on Trust (DoITrust): graph neural network to reveal untrusted domains.
-
Cognitive Deception Detector (CDD): Linguistic & cognitive similarities for deceptive web domains.
July 2022
TAPE is born!
Supported by Cyber Security CRC, West Australia Government, and Data61 CSIRO
2010's
AI and Machine Learning
Very promissing results on machine intelligence are seen using Artificial Intelligence and Machine Learning.
2000's
Hacking and Phishing
Start of more targeted cyberattacks such as credit cards and passwords stealing. The attacks are now extended to secure and sensitive government and business information.
1990's
Virus Headache and Antivirus Industry
Appearance of newer types of viruses such as 'I LOVE YOU' and Melissa infected tens of millions of computers, causing a worldwide failure of email systems. It led to the creation of antivirus industries.
1970's
First cyber worm.
Robert Thomas created Creeper, the first computer worm that could move in a network, leaving behind a trail of “I’M THE CREEPER: CATCH ME IF YOU CAN” message.
Peter Bouhlas, DGov WA CISO
“The West Australian Security Operation Centre (WASOC) within the Department of Premier and Cabinet is in the process of deploying and testing the threat hunting tool. The WA Government is pleased to be the first user of the tool and is looking forward to determining the tool’s capability to detect threats within the logs."
Working With the Best



Address
Building 101, Clunies Ross Street
Black Mountain ACT 2601
Australia
Phone
1300 363 400
+61 3 9545 2176
sharif[dot]abuadbba[at]data61.csiro.au