Detecting of Targeted Malicious Email

被引:0
|
作者
Deshmukh, Priyanka [1 ]
Shelar, Megha [1 ]
Kulkarni, Nikhil [1 ]
机构
[1] Sandip Fdn, Sandip Inst Technol & Res Ctr, Dept Comp Engn, Nasik 422213, Maharashtra, India
关键词
Targeted Malicious Email; Non-Targeted Malicious Email; Random Forest Classifier; Filtering;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network providers are the one which allows all type of emails for communication purpose. While transferring the messages some malicious emails are received by the users this causes many problems either at the server side or at the user side. This type of emails may contain unsolicited content, or it could be due to the message being crafted. Persistent threat features, such as threat actor locale and unsolicited email crafting tools, along with recipient oriented features. Current detection techniques work well for spam and phishing because its easy to detect mass-generated email sent to millions of addresses. TME mainly targets single users or small groups in low volumes. TME can pretend network exploitation. Hence for detection of TME is vital work. This paper explains how the malicious emails are classified. In order to classify here we are using 'Random Forest Classifier'. This classifier focuses on feature extraction.
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [21] Detecting image based spam email
    Ma, Wanli
    Tran, Dat
    Sharma, Dharmendra
    [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 168 - 177
  • [22] Detecting Unwanted Email Using VAT
    Islam, Md. Rafiqul
    Chowdhury, Morshed U.
    [J]. SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING 2011, 2011, 368 : 113 - 126
  • [23] Detecting Targeted Malicious E-Mail Using Linear Regression Algorithm with Data Mining Techniques
    Rao, A. Sesha
    Avadhani, P. S.
    Chaudhuri, Nandita Bhanja
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 23 - 35
  • [24] Detecting Malicious Driving with Machine Learning
    Yardy, Kevin
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [25] Proposal of a method detecting malicious processes
    Yamamoto, Takumi
    Kawauchi, Kiyoto
    Sakurai, Shoji
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 518 - 523
  • [26] Malicious Event Detecting in Twitter Communities
    Amato, Flora
    Cozzolino, Giovanni
    Mazzeo, Antonino
    Romano, Sara
    [J]. INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016, 2016, 55 : 63 - 72
  • [27] Improving malicious email detection through novel designated deep-learning architectures utilizing entire email
    Muralidharan, Trivikram
    Nissim, Nir
    [J]. NEURAL NETWORKS, 2023, 157 : 257 - 279
  • [28] Analyzing and Detecting Malicious Flash Advertisements
    Ford, Sean
    Cova, Marco
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 363 - 372
  • [29] A toolkit for detecting and analyzing malicious software
    Weber, M
    Schmid, M
    Schatz, M
    Geyer, D
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 423 - 431
  • [30] Detecting Malicious Activity with DNS Backscatter
    Fukuda, Kensuke
    Heidemann, John
    [J]. IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, : 197 - 210