Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
来源
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS | 2019年
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [41] Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning
    Rahman, M. M. Hafizur
    Al Naeem, Mohammed
    Abubakar, Adamu
    IEEE ACCESS, 2022, 10 : 110294 - 110308
  • [42] 'Working and saving for retirement': New Labour's reform of company pensions
    Hyde, M
    Dixon, J
    CRITICAL SOCIAL POLICY, 2004, 24 (02) : 270 - 282
  • [43] CrowdNet: Identifying Large-Scale Malicious Attacks Over Android Kernel Structures
    Wang, Xinning
    Li, Chong
    Song, Dalei
    IEEE ACCESS, 2020, 8 : 15823 - 15837
  • [44] A new machine learning method for identifying Alzheimer's disease
    Liu, Lin
    Zhao, Shenghui
    Chen, Haibao
    Wang, Aiguo
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 99
  • [45] Increase of a company's efficiency by implementing the computer technology Enterprise Application Integration
    Budacia, Lucian Constantin Gabriel
    Budacia, Elisabeta Andreea
    Iacob, Ionel
    MICBE '09: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN BUSINESS AND ECONOMICS, 2009, : 100 - +
  • [46] A constant-time identifying large-scale RFID tags using lines on a plane
    Chou, Jue-Sam
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2014, 25 (11): : 1083 - 1094
  • [47] Bridging local and global data cleansing: Identifying class noise in large, distributed data datasets
    Zhu, XQ
    Wu, XD
    Chen, QJ
    DATA MINING AND KNOWLEDGE DISCOVERY, 2006, 12 (2-3) : 275 - 308
  • [48] Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems
    Ai, Xin
    Chen, Honglong
    Lin, Kai
    Wang, Zhibo
    Yu, Jiguo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 714 - 727
  • [49] Identifying Rare Circumstances Preceding Female Firearm Suicides: Validating A Large Language Model Approach
    Zhou, Weipeng
    Prater, Laura C.
    Goldstein, Evan, V
    Mooney, Stephen J.
    JMIR MENTAL HEALTH, 2023, 10
  • [50] Bridging Local and Global Data Cleansing: Identifying Class Noise in Large, Distributed Data Datasets
    XINGQUAN ZHU
    XINDONG WU
    QIJUN CHEN
    Data Mining and Knowledge Discovery, 2006, 12 : 275 - 308