Analysis of phishing emails

被引:0
|
作者
Burita L. [1 ]
Matoulek P. [1 ]
Halouzka K. [1 ]
Kozak P. [1 ]
机构
[1] Department of Informatics and Cyber Operations, University of Defence, 65 Kounicova Street, Brno
来源
Burita, Ladislav (ladislav.burita@unob.cz) | 1600年 / American Institute of Mathematical Sciences卷 / 05期
关键词
Charity; Fund; Others); Phishing email; analysis; statistics; segmentation (business; Text analytical SW Tovek; Transfer;
D O I
10.3934/ELECTRENG.2021006
中图分类号
学科分类号
摘要
This research aims to describe and analyze phishing emails. The problem of phishing, types of message content of phishing emails, and the basic techniques of phishing email attacks are explained by way of introduction. The study also includes a review of the relevant literature on Web of Science and analyzes articles that deal with the threat of phishing attacks and defense against them. Data collected within a time interval of two months from two email accounts of one of the authors of the study was used for the analysis of 200 email messages. Data has been resented in tabular form, to allow further statistical processing using functions such as sum, average and frequency analysis. The core part of the study involved the classification and segmentation of emails according to the main goals of the sent message. The text analytical software Tovek, was used for the analysis, Contribution of the manuscript is in the understanding of phishing emails and extending the knowledge base in education and training in phishing email defense. The discussion compares the results of this research with those of the studies mentioned in the ―Introduction" and ―Literature review" sections. Furthermore, the emerging problems and limitations of the use of text analytical software are described, and finally the issue is devoted to problems with obtaining personal data from recipients’ emails. The ―Conclusion" section summarizes the contributions of this research. © 2021 the Author(s)
引用
收藏
页码:93 / 116
页数:23
相关论文
共 50 条
  • [21] Profiling Phishing Emails Based on Hyperlink Information
    Yearwood, John
    Mammadov, Musa
    Banerjee, Arunava
    2010 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2010), 2010, : 120 - 127
  • [22] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [23] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [24] Phishing Emails Detection Using CS-SVM
    Niu, Weina
    Zhang, Xiaosong
    Yang, Guowu
    Ma, Zhiyuan
    Zhuo, Zhongliu
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1054 - 1059
  • [25] On Identifying Phishing Emails: Uncertainty in Machine and Human Judgment
    Stuart, Lauren M.
    Park, Gilchan
    Taylor, Julia M.
    Raskin, Victor
    2014 IEEE CONFERENCE ON NORBERT WIENER IN THE 21ST CENTURY (21CW), 2014,
  • [26] A Sender-Centric Approach to Detecting Phishing Emails
    Sanchez, Fernando
    Duan, Zhenhai
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 32 - 39
  • [27] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244
  • [28] A New English/Arabic Parallel Corpus for Phishing Emails
    Salloum, Said
    Gaber, Tarek
    Vadera, Sunil
    Shaalan, Khaled
    ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING, 2023, 22 (07)
  • [29] Spear Phishing Emails Detection Based on Machine Learning
    Ding, Xiong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Qiuyun
    Xin, Liling
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 354 - 359
  • [30] Eyes on phishing emails: an eye-tracking study
    Ribeiro, Liliana
    Guedes, Ines Sousa
    Cardoso, Carla Sofia
    JOURNAL OF EXPERIMENTAL CRIMINOLOGY, 2024,