End to End Autorship Email Verification Framework for a Secure Communication

被引:0
|
作者
Giorgi, Giacomo [1 ]
Saracino, Andrea [1 ]
Martinelli, Fabio [1 ]
机构
[1] CNR, Informat & Telemat Inst IIT, Via G Moruzzi 1, Pisa, Italy
基金
欧盟地平线“2020”;
关键词
Machine learning; Deep learning; Privacy-preserving; Email authorship; Email spoofing; Scam emails; Spear-phishing; MESSAGES;
D O I
10.1007/978-3-030-94900-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes an alternative email account protection to prevent a very specific targeting email attacks where an attacker can impersonate a legitimate/trusted sender to steal personal information to the recipient. Authorship mechanism based on the analysis of the author's writing style and implemented through binary traditional and deep learning classifiers is applied to build the email verification mechanism. A flexible architecture, where the authorship component can be placed in different locations, is proposed. Due to its location and consequently to the email data available, can be exploited an individual writing style, or an end to end writing style learning related to the sender-receiver communication. The system is validated on two different dataset (i) the well-known public Enron dataset, with the experiments showing the author verification accuracy of 96.5% and 99% respectively for the individual and end to end writing style learning and (ii) our private dataset, with accuracy results of 98.3% and 97%. An alternative classification training, that exploits the partition of the dataset in subsets having approximately the same length, is presented. From the results obtained is proved how such training approach outperforms the traditional training where emails of different lengths are contained in the same training dataset. The overall results obtained proved that the authorship mechanism proposed is a promising alternative support technique exploitable as an email anti-scam or anti-theft tool to guarantee secure email communication.
引用
收藏
页码:73 / 96
页数:24
相关论文
共 50 条
  • [1] Quantum-resistant End-to-End Secure Messaging and Email Communication
    Doeberl, Christoph
    Eibner, Wolfgang
    Gaertner, Simon
    Kos, Manuela
    Kutschera, Florian
    Ramacher, Sebastian
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [2] An Add-on End-to-end Secure Email Solution in Mobile Communications
    Zhao, Shushan
    Liu, Shuping
    [J]. 10TH EAI INTERNATIONAL CONFERENCE ON MOBILE MULTIMEDIA COMMUNICATIONS (MOBIMEDIA 2017), 2017, : 63 - 67
  • [3] End to End Secure Anonymous Communication for Secure Directed Diffusion in IoT
    Sengupta, Jayasree
    Ruj, Sushmita
    Das Bit, Sipra
    [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 445 - 450
  • [4] A framework for end-to-end verification for digital microfluidics
    Pushpita Roy
    Ansuman Banerjee
    Bhargab B. Bhattacharya
    [J]. Innovations in Systems and Software Engineering, 2021, 17 : 231 - 245
  • [5] A framework for end-to-end verification for digital microfluidics
    Roy, Pushpita
    Banerjee, Ansuman
    Bhattacharya, Bhargab B.
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2021, 17 (03) : 231 - 245
  • [6] End-to-end secure group communication for the Internet of Things
    Lizardo, Andre
    Barbosa, Raul
    Neves, Samuel
    Correia, Jaime
    Araujo, Filipe
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [7] A framework for end-to-end verification and evaluation of register allocators
    Nandivada, V. Krishna
    Pereira, Fernando Magno Quintao
    Palsberg, Jens
    [J]. STATIC ANALYSIS, PROCEEDINGS, 2007, 4634 : 153 - +
  • [8] Towards Flexible and Secure End-to-End Communication in Industry 4.0
    Maksuti, Silia
    Bicaku, Ani
    Tauber, Markus
    Palkovits-Rauter, Silke
    Haas, Sarah
    Delsing, Jerker
    [J]. 2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 883 - 888
  • [9] Secure End-to-End SMS Communication over GSM Networks
    Islam, Saad
    Ul Haq, Inam
    Saeed, Amna
    [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 286 - 292
  • [10] Secure End-to-End Communication over GSM and PSTN Networks
    Islam, Saad
    Ajmal, Fatima
    Ali, Salman
    Zahid, Jawad
    Rashdi, Adnan
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 321 - 324