An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning

被引:0
|
作者
Venckauskas, Algimantas [1 ]
Toldinas, Jevgenijus [1 ]
Morkevicius, Nerijus [1 ]
Sanfilippo, Filippo [2 ]
机构
[1] Kaunas Univ Technol, Dept Comp Sci, LT-44249 Kaunas, Lithuania
[2] Univ Agder UiA, Dept Engn Sci, N-4879 Grimstad, Norway
关键词
cyber threat intelligence; email; domain ontology; machine learning;
D O I
10.3390/electronics13142716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Email is an excellent technique for connecting users at low cost. Spam emails pose the risk of collecting a user's personal information by fooling them into clicking on a link or engaging in other fraudulent activities. Furthermore, when a spam message is delivered, the user may read the entire message before deciding it is spam and deleting it. Most approaches to email classification proposed by other authors use natural language processing (NLP) methods to analyze the content of email messages. One of the biggest shortcomings of NLP-based methods is their dependence on the language in which a message is written. To construct an effective email cyber threat intelligence (CTI) sharing framework, the privacy of a message's content must be preserved. This article proposes a novel domain-specific ontology and method for emails that require only the metadata of email messages to be shared to preserve their privacy, making them applicable to solutions for sharing email CTI. To preserve privacy, a new semantic parser was developed for the proposed email domain-specific ontology to populate email metadata and create a dataset. Machine learning algorithms were examined, and experiments were conducted to identify and classify spam messages using the newly created dataset. Feature-ranking algorithms, chi-squared, ANOVA (analysis of variance), and Kruskal-Wallis tests were used. In all experiments, the kernel na & iuml;ve Bayes model demonstrated acceptable results. The highest accuracy of 92.28% and an F1 score of 95.92% for recognizing spam email messages were obtained using the proposed domain-specific ontology, the newly developed semantic parser, and the created metadata dataset.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Evolving Email Clustering Method for Email Grouping: A Machine Learning Approach
    Ayodele, Taiwo
    Zhou, Shikun
    Khusainov, Rinat
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 357 - 362
  • [22] A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence
    Wang, Menghan
    Yang, Libin
    Lou, Wei
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 178 - 181
  • [23] An automated dynamic quality assessment method for cyber threat intelligence
    Yang, Libin
    Wang, Menghan
    Lou, Wei
    COMPUTERS & SECURITY, 2025, 148
  • [24] A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective
    Li Qiang
    Jiang Zhengwei
    Yang Zeming
    Liu Baoxu
    Wang Xin
    Zhang Yunan
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 269 - 276
  • [25] BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
    Jiang, Tongtong
    Shen, Guowei
    Guo, Chun
    Cui, Yunhe
    Xie, Bo
    COMPUTER NETWORKS, 2023, 224
  • [26] Enhanced Cyber Threat Detection System Leveraging Machine Learning Using Data Augmentation
    Iftikhar, Umar
    Ali, Syed Abbas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 218 - 225
  • [27] Using Machine Learning to Improve the Email Experience
    Najork, Marc
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 891 - 891
  • [28] INTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
    Koloveas, Paris
    Chantzios, Thanasis
    Alevizopoulou, Sofia
    Skiadopoulos, Spiros
    Tryfonopoulos, Christos
    ELECTRONICS, 2021, 10 (07)
  • [29] A Decentralized Approach to Threat Intelligence using Federated Learning in Privacy-Preserving Cyber Security
    Sakhare, Nitin N.
    Kulkarni, Raj
    Rizvi, Nuzhat
    Raich, Devashri
    Dhablia, Anishkumar
    Bendale, Shailesh P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 106 - 125
  • [30] Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
    Ghaleb, Fuad A.
    Alsaedi, Mohammed
    Saeed, Faisal
    Ahmad, Jawad
    Alasli, Mohammed
    SENSORS, 2022, 22 (09)