2 Years in the anti-phishing group of a large company

被引:9
|
作者
Gallo, Luigi [1 ,2 ]
Maiello, Alessandro [1 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Via Reiss Romoli 274, I-10148 Turin, Italy
[2] Univ Napoli Federico II, Via Claudio 21, I-80125 Naples, Italy
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Spam email; Phishing email; Machine learning; Security awareness;
D O I
10.1016/j.cose.2021.102259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-grade spam filters. Dangerous spam emails may thus reach the users and then result in damaging attacks spreading through the corporate network. This paper describes a collaborative approach for early detection of malicious spam emails and its application in the context of large companies. By the joint effort of the employees and the security analysts during the last two years, a large dataset of potentially malicious spam emails has been collected with each email being labeled as critical or irrelevant spam. By analyzing the main distinguishing characteristics of dangerous emails, a set of both traditional and novel features was identified and then tested and optimized by applying common supervised machine learning classifiers. The obtained massive experimental results show that Support Vector Machine and Random Forest classifiers achieve the best performance, with the optimized feature set of only 36 features achieving 91.6% Recall and 95.2% Precision. These results, confirmed by a large empirical experiment conducted on 40,000+ company employees, led to the re-engineering of the email threat management process to ensure a high level of security in the company, as well as an increased security awareness of all company employees.& nbsp; (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    [J]. SN Computer Science, 2020, 1 (1)
  • [2] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [3] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [4] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [5] NoPhish: An anti-phishing education app
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 88 - 192
  • [6] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [7] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    [J]. 3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185
  • [8] A framework for assessment of anti-phishing preparedness
    Leung, Alvin Chung Man
    Bose, Indranil
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1020 - +
  • [9] Email Anti-Phishing Detection Application
    Helmi, Rabab Alayham Abbas
    Ren, Chua Shang
    Jamal, Arshad
    Abdullah, Muhammad Irsyad
    [J]. 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 264 - 267
  • [10] Anti-Phishing Awareness Delivery Methods
    Darem, Abdulbasit
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7944 - 7949