Analyzing Social and Stylometric Features to Identify Spear phishing Emails

被引:0
|
作者
Dewan, Prateek [1 ,2 ]
Kashyap, Anand [1 ,2 ,3 ]
Kumaraguru, Ponnurangam
机构
[1] Indraprastha Inst Informat Technol, Delhi, India
[2] IIIT Delhi, Cybersecur Educ & Res Ctr, Delhi, India
[3] Symantec Res Labs, Herndon, VA USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Targeted social engineering attacks in the form of spear phishing emails, are often the main gimmick used by attackers to infiltrate organizational networks and implant state-of-the-art Advanced Persistent Threats (APTs). Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise confidential information. What makes spear phishing different, and more powerful than normal phishing, is this contextual information about the victim. Online social media services can be one such source for gathering vital information about an individual. In this paper, we characterize and examine a true positive dataset of spear phishing, spam, and normal phishing emails from Symantec's enterprise email scanning service. We then present a model to detect spear phishing emails sent to employees of 14 international organizations, by using social features extracted from LinkedIn. Our dataset consists of 4,742 targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack emails sent to 5,912 non victims; and publicly available information from their LinkedIn profiles. We applied various machine learning algorithms to this labeled data, and achieved an overall maximum accuracy of 97.76% in identifying spear phishing emails. We used a combination of social features from LinkedIn profiles, and stylometric features extracted from email subjects, bodies, and attachments. However, we achieved a slightly better accuracy of 98.28% without the social features. Our analysis revealed that social features extracted from LinkedIn do not help in identifying spear phishing emails. To the best of our knowledge, this is one of the first attempts to make use of a combination of stylometric features extracted from emails, and social features extracted from an online social network to detect targeted spear phishing emails.
引用
收藏
页数:13
相关论文
共 40 条
  • [1] ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS
    Ghafir, Ibrahim
    Prenosil, Vaclav
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 34 - 41
  • [2] Spear Phishing Emails Detection Based on Machine Learning
    Ding, Xiong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Qiuyun
    Xin, Liling
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 354 - 359
  • [3] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [4] Why do users not report spear phishing emails?
    Kwak, Youngsun
    Lee, Seyoung
    Damiano, Amanda
    Vishwanath, Arun
    TELEMATICS AND INFORMATICS, 2020, 48 (48)
  • [5] Training Users to Identify Phishing Emails
    Weaver, Bradley W.
    Braly, Adam M.
    Lane, David M.
    JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, 2021, 59 (06) : 1169 - 1183
  • [6] Evaluating spam filters and Stylometric Detection of AI-generated phishing emails
    Opara, Chidimma
    Modesti, Paolo
    Golightly, Lewis
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 276
  • [7] EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails
    Duman, Sevtap
    Cakmakci, Kubra Kalkan
    Egele, Manuel
    Robertson, William
    Kirda, Engin
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 408 - 416
  • [8] Predicting susceptibility to social influence in phishing emails
    Parsons, Kathryn
    Butavicius, Marcus
    Delfabbro, Paul
    Lillie, Meredith
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 128 : 17 - 26
  • [9] Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme
    Sonowal, Gunikhan
    Sharma, Aditi
    Kharb, Latika
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (03): : 117 - +
  • [10] Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
    Gascon, Hugo
    Ullrich, Steffen
    Stritter, Benjamin
    Rieck, Konrad
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 69 - 91