Detecting of Targeted Malicious Email

被引:0
|
作者
Deshmukh, Priyanka [1 ]
Shelar, Megha [1 ]
Kulkarni, Nikhil [1 ]
机构
[1] Sandip Fdn, Sandip Inst Technol & Res Ctr, Dept Comp Engn, Nasik 422213, Maharashtra, India
关键词
Targeted Malicious Email; Non-Targeted Malicious Email; Random Forest Classifier; Filtering;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network providers are the one which allows all type of emails for communication purpose. While transferring the messages some malicious emails are received by the users this causes many problems either at the server side or at the user side. This type of emails may contain unsolicited content, or it could be due to the message being crafted. Persistent threat features, such as threat actor locale and unsolicited email crafting tools, along with recipient oriented features. Current detection techniques work well for spam and phishing because its easy to detect mass-generated email sent to millions of addresses. TME mainly targets single users or small groups in low volumes. TME can pretend network exploitation. Hence for detection of TME is vital work. This paper explains how the malicious emails are classified. In order to classify here we are using 'Random Forest Classifier'. This classifier focuses on feature extraction.
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [1] Detecting Targeted Malicious Email
    Amin, Rohan M.
    Ryan, Julie J. C. H.
    van Dorp, J. Rene
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 64 - 71
  • [2] Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments
    Sachidananda, Vinay
    Muneeswaran, Sivaanandh
    Yang, Liu
    Lam, Kwok-Yan
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 412 - 421
  • [3] Targeted Malicious Email Detection using Hypervisor-based Dynamic Analysis and Ensemble Learning
    Zhang, Jian
    Li, Wenzhen
    Gong, Liangyi
    Gu, Zhaojun
    Wu, Jeffrey
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [4] Trusted email protocol: Dealing with privacy concerns from malicious email intermediaries
    Jang, Julian
    Nepal, Surya
    Zic, John
    [J]. 2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 402 - 407
  • [5] An intelligent embedded system for malicious email filtering
    Shih, Dong-Her
    Chiang, Hsiu-Sen
    Yen, David C.
    Huang, Shin-Chuan
    [J]. COMPUTER STANDARDS & INTERFACES, 2013, 35 (05) : 557 - 565
  • [6] APN model construction for malicious email detection
    Chiang, Hsiu-Sen
    Shih, Dong-Her
    Shih, Ming-Hung
    Chang, J. Morris
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (13) : 5696 - 5704
  • [7] Detecting malicious SQL
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
  • [8] MEF: Malicious Email Filter - A UNIX mail filter that detects malicious Windows executables
    Schultz, MG
    Eskin, E
    Zadok, E
    Bhattacharyya, M
    Stolfo, SJ
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2001, : 245 - 252
  • [9] Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
    Kalafut, Andrew J.
    Shue, Craig A.
    Gupta, Minaxi
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [10] Characterizing and Detecting Malicious Crowdsourcing
    Wang, Tianyi
    Wang, Gang
    Li, Xing
    Zheng, Haito
    Zhao, Ben Y.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 537 - 538