Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
来源
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS | 2019年
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [21] An approach to identifying threats of extracting confidential data from automated control systems based on internet technologies
    Kuzmin, Vladimir N.
    Menisov, Artem B.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2021, 15 (03): : 35 - 47
  • [22] How to Understand AI's Privacy Threats in Ubiquitous Computing
    Toch, Eran
    Birman, Yoni
    PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 931 - 936
  • [23] Threats to the exploration, production and supply of Africa's energy resources
    Adusei, Aikins
    SOUTH AFRICAN JOURNAL OF INTERNATIONAL AFFAIRS-SAJIA, 2015, 22 (01): : 43 - 65
  • [24] Green standard model using machine learning: identifying threats and opportunities facing the implementation of green building in Iran
    Rajabi, Mohamad
    Sardroud, Javad Majrouhi
    Kheyroddin, Ali
    ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2021, 28 (44) : 62796 - 62808
  • [25] A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in lenuclear power plants
    Wang, Wei
    Cammi, Antonio
    Di Maio, Francesco
    Lorenzi, Stefano
    Zio, Enrico
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 175 : 24 - 37
  • [26] Identifying progression subphenotypes of Alzheimer's disease from large-scale electronic health records with machine learning
    Zhou, Manqi
    Tang, Alice S.
    Zhang, Hao
    Xu, Zhenxing
    Ke, Alison M. C.
    Su, Chang
    Huang, Yu
    Mantyh, William G.
    Jaffee, Michael S.
    Rankin, Katherine P.
    Dekosky, Steven T.
    Zhou, Jiayu
    Guo, Yi
    Bian, Jiang
    Sirota, Marina
    Wang, Fei
    JOURNAL OF BIOMEDICAL INFORMATICS, 2025, 165
  • [27] Green standard model using machine learning: identifying threats and opportunities facing the implementation of green building in Iran
    Mohamad Rajabi
    Javad Majrouhi Sardroud
    Ali Kheyroddin
    Environmental Science and Pollution Research, 2021, 28 : 62796 - 62808
  • [28] Classification of Large DNA Methylation Datasets for Identifying Cancer Drivers
    Celli, Fabrizio
    Cumbo, Fabio
    Weitschek, Emanuel
    BIG DATA RESEARCH, 2018, 13 : 21 - 28
  • [29] Large-scale intent analysis for identifying large-review-effort code changes
    Wang, Song
    Bansal, Chetan
    Nagappan, Nachiappan
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 130
  • [30] Refugee rights or refugees as threats? Germany's new Asylum policy
    Ilgit, Asli
    Klotz, Audie
    BRITISH JOURNAL OF POLITICS & INTERNATIONAL RELATIONS, 2018, 20 (03) : 613 - 631