Detecting of Targeted Malicious Email

被引:0
|
作者
Deshmukh, Priyanka [1 ]
Shelar, Megha [1 ]
Kulkarni, Nikhil [1 ]
机构
[1] Sandip Fdn, Sandip Inst Technol & Res Ctr, Dept Comp Engn, Nasik 422213, Maharashtra, India
关键词
Targeted Malicious Email; Non-Targeted Malicious Email; Random Forest Classifier; Filtering;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network providers are the one which allows all type of emails for communication purpose. While transferring the messages some malicious emails are received by the users this causes many problems either at the server side or at the user side. This type of emails may contain unsolicited content, or it could be due to the message being crafted. Persistent threat features, such as threat actor locale and unsolicited email crafting tools, along with recipient oriented features. Current detection techniques work well for spam and phishing because its easy to detect mass-generated email sent to millions of addresses. TME mainly targets single users or small groups in low volumes. TME can pretend network exploitation. Hence for detection of TME is vital work. This paper explains how the malicious emails are classified. In order to classify here we are using 'Random Forest Classifier'. This classifier focuses on feature extraction.
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [31] Detecting malicious logins as graph anomalies
    Powell, Brian A.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [32] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [33] A Method for Detecting Unknown Malicious Executables
    Rozenberg, Boris
    Gudes, Ehud
    Elovici, Yuval
    Fledel, Yuval
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 190 - 196
  • [34] Detecting malicious code by model checking
    Kinder, J
    Katzenbeisser, S
    Schallhart, C
    Veith, H
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 174 - 187
  • [35] Detecting Malicious Fast Flux Domains
    Qassrawi, Mahmoud T.
    Zhang, Hongli
    [J]. MECHATRONICS AND APPLIED MECHANICS, PTS 1 AND 2, 2012, 157-158 : 1264 - 1273
  • [36] Detecting Malicious Assembly with Deep Learning
    Santacroce, M.
    Koranek, Daniel
    Kapp, David
    Ralescu, Anca
    Jha, R.
    [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 82 - 85
  • [37] A Layered Architecture for Detecting Malicious Behaviors
    Martignoni, Lorenzo
    Stinson, Elizabeth
    Fredrikson, Matt
    Jha, Somesh
    Mitchell, John C.
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008, 2008, 5230 : 78 - +
  • [38] Fatih: Detecting and isolating malicious routers
    Mizrak, AT
    Cheng, YC
    Marzullo, K
    Savage, S
    [J]. 2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 538 - 547
  • [39] Detecting Malicious Authentication Events Trustfully
    Kaiafas, Georgios
    Varisteas, Georgios
    Lagraa, Sofiane
    State, Radu
    Nguyen, Cu D.
    Ries, Thorsten
    Ourdane, Mohamed
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [40] Detecting the Malicious Application using FRAppE
    Sultana, Yasmeen
    Khodanpur, B. I.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1027 - 1032