Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme

被引:0
|
作者
Sonowal, Gunikhan [1 ]
Sharma, Aditi [2 ]
Kharb, Latika [3 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Guntur 522502, Andhra Pradesh, India
[2] Quantum Univ, Dept Comp Sci & Engn, Roorkee 247667, Uttar Pradesh, India
[3] Jagan Inst Management Studies JIMS, Dept Comp Sci & Engn, Delhi 110085, India
来源
关键词
Spear Phishing; phishing; Social engineering; Machine learning algorithm; author's writing-style; cyber-security; MODEL; FEATURES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is a critical cybersecurity issue that differs from other attacks. This attack practices social engineering techniques to prompt users to disclose their credentials. Spear phishing is an advanced version of phishing attacks where the attacker investigates the online behavior of an individual or organization to gather the information for constructing an email that appears to be legitimate. As a result, spear-phishing holds a high success rate than traditional phishing emails since these emails can evade the standard security barriers and harvest the credentials. This paper presents an abstract method that collects features from different dimensions: phishing domain features, stylometric features, and others to detect spear-phishing emails. The auto-upgrade profile is additionally supplemented by the method to detect phishing emails within a second. Finally, the method employs a machine-learning algorithm to classify spear-phishing emails from legitimate emails. This paper owns the uniqueness of detecting traditional phishing emails as well as spear-phishing emails using multi-dimensional features. Finally, this paper applied the publicly verifiable secret sharing to verify the email whether the sender is genuine or not.
引用
收藏
页码:117 / +
页数:8
相关论文
共 50 条
  • [1] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [2] Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
    Gascon, Hugo
    Ullrich, Steffen
    Stritter, Benjamin
    Rieck, Konrad
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 69 - 91
  • [3] Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content
    Lin, Tian
    Capecci, Daniel E.
    Ellis, Donovan M.
    Rocha, Harold A.
    Dommaraju, Sandeep
    Oliveira, Daniela S.
    Ebner, Natalie C.
    ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2019, 26 (05)
  • [4] Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Aparicio-Navarro, Francisco J.
    Rabie, Khaled
    Jabban, Ahmad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [5] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [6] Spear Phishing Emails Detection Based on Machine Learning
    Ding, Xiong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Qiuyun
    Xin, Liling
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 354 - 359
  • [7] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [8] Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
    Imai, Takato
    Iwamura, Keiichi
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 1: DCNET, ICE-B, OPTICS, SIGMAP AND WINSYS (ICETE), 2019, : 172 - 179
  • [9] A verifiable rational secret sharing scheme based on bilinear pairing
    Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40):
  • [10] Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes
    Bai, Chen-Ming
    Feng, Yanan
    Zhang, Sujuan
    Liu, Lu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (01)