Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
来源
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS | 2019年
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] Heuristic machine learning approaches for identifying phishing threats across web and email platforms
    Jayaprakash, Ramprasath
    Natarajan, Krishnaraj
    Daniel, J. Alfred
    Chinnappan, Chandru Vignesh
    Giri, Jayant
    Qin, Hong
    Mallik, Saurav
    FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2024, 7
  • [2] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18
  • [3] CONTENT ANALYSIS AS A WAY OF IDENTIFYING HYBRID THREATS IN THE MEDIA CONENT
    Ninov, Marian
    Atanasov, Plamen
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (03): : 101 - 108
  • [4] Detecting and Identifying Insider Threats Based on Advanced Clustering Methods
    Nikiforova, Oksana
    Romanovs, Andrejs
    Zabiniako, Vitaly
    Kornienko, Jurijs
    IEEE ACCESS, 2024, 12 : 30242 - 30253
  • [5] Cybercrime and Privacy Threats of Large Language Models
    Kshetri, Nir
    IT PROFESSIONAL, 2023, 25 (03) : 9 - 13
  • [6] On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats
    Angelogianni, Anna
    Politis, Ilias
    Mohammadi, Farnaz
    Xenakis, Christos
    IEEE ACCESS, 2020, 8 : 224677 - 224701
  • [7] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [8] Identifying and Modeling the Impact of Cyber Threats in the Field of Cyber Risk Insurance
    Pavlik, Lukas
    2018 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND INDUSTRY (MCSI 2018), 2018, : 118 - 121
  • [9] Identifying the most accurate machine learning classification technique to detect network threats
    Farouk, Mohamed
    Sakr, Rasha Hassan
    Hikal, Noha
    NEURAL COMPUTING & APPLICATIONS, 2024, 36 (16) : 8977 - 8994
  • [10] Identifying the most accurate machine learning classification technique to detect network threats
    Mohamed Farouk
    Rasha Hassan Sakr
    Noha Hikal
    Neural Computing and Applications, 2024, 36 : 8977 - 8994