Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
来源
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS | 2019年
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [31] Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company
    Crowther, Kenneth G.
    Rust, Brian
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 74 - 79
  • [32] Can a Company's Poor Customer Service Be a Security Risk? An Examination of Airbnb's Twitter Data Using Artificial Intelligence Supervised Machine Learning
    Binns, Chelsea
    Kempf, Robin J.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2025,
  • [33] Europe's Refugee Crisis in 2015 and Security Threats from the Baltic Perspective
    Veebel, Viljar
    Markus, Raul
    JOURNAL OF POLITICS AND LAW, 2015, 8 (04) : 254 - 262
  • [34] Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android
    Antonioli, Daniele
    Tippenhauer, Nils Ole
    Rasmussen, Kasper B.
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [35] Investigating the role of Cybersecurity's perceived threats in the adoption of health information systems
    Zhan, Yiyu
    Ahmad, Sayed Fayaz
    Irshad, Muhammad
    Al-Razgan, Muna
    Awwad, Emad Marous
    Ali, Yasser A.
    Ayassrah, Ahmad Y. A. Bani Ahmad
    HELIYON, 2024, 10 (01)
  • [36] Corporatized Oikonomia: An Ethnography of a Coal Company's Complaints Office
    Jakobsen, Line Jespersgaard
    JOURNAL OF LATIN AMERICAN GEOGRAPHY, 2024, 23 (03)
  • [37] Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge
    Zielinski, Sebastian
    COMPUTER LAW & SECURITY REVIEW, 2024, 54
  • [38] Identifying D Mesons from Radiative W Decays at the Large Hadron Collider
    Bakos, Evelin
    de Groot, Nicolo
    Vranjes, Nenad
    SYMMETRY-BASEL, 2023, 15 (10):
  • [39] Leveraging Change Intents for Characterizing and Identifying Large-Review-Effort Changes
    Wang, Song
    Bansal, Chetan
    Nagappan, Nachiappan
    Philip, Adithya Abraham
    15TH INTERNATIONAL CONFERENCE ON PREDICTIVE MODELS AND DATA ANALYTICS IN SOFTWARE ENGINEERING (PROMISE'19), 2019, : 46 - 55
  • [40] Italy's military interventions and new security threats: the cases of Somalia, Darfur and Haiti
    Ceccorulli, Michela
    Coticchia, Fabrizio
    CONTEMPORARY POLITICS, 2016, 22 (04) : 412 - 431