2 Years in the anti-phishing group of a large company

被引:9
|
作者
Gallo, Luigi [1 ,2 ]
Maiello, Alessandro [1 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Via Reiss Romoli 274, I-10148 Turin, Italy
[2] Univ Napoli Federico II, Via Claudio 21, I-80125 Naples, Italy
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Spam email; Phishing email; Machine learning; Security awareness;
D O I
10.1016/j.cose.2021.102259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-grade spam filters. Dangerous spam emails may thus reach the users and then result in damaging attacks spreading through the corporate network. This paper describes a collaborative approach for early detection of malicious spam emails and its application in the context of large companies. By the joint effort of the employees and the security analysts during the last two years, a large dataset of potentially malicious spam emails has been collected with each email being labeled as critical or irrelevant spam. By analyzing the main distinguishing characteristics of dangerous emails, a set of both traditional and novel features was identified and then tested and optimized by applying common supervised machine learning classifiers. The obtained massive experimental results show that Support Vector Machine and Random Forest classifiers achieve the best performance, with the optimized feature set of only 36 features achieving 91.6% Recall and 95.2% Precision. These results, confirmed by a large empirical experiment conducted on 40,000+ company employees, led to the re-engineering of the email threat management process to ensure a high level of security in the company, as well as an increased security awareness of all company employees.& nbsp; (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    [J]. 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 105 - +
  • [22] AN ENHANCED DEA METHOD FOR GROUP EVALUATION - THE EMPIRICAL STUDY OF ANTI-PHISHING EFFICIENCY
    Kao, Han-Ying
    Hsu, Chu-Ling
    Huang, Chia-Hui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (11): : 4869 - 4878
  • [23] SEFAP: An email system fox anti-phishing
    Ren, Qiong
    Mu, Yi
    Susilo, Willy
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
  • [24] POSTER: Proactive Blacklist Update for Anti-Phishing
    Lee, Lung-Hao
    Lee, Kuei-Ching
    Chen, Hsin-Hsi
    Tseng, Yuen-Hsien
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450
  • [25] An Evaluation of Users' Anti-Phishing Knowledge Retention
    Alnajim, Abdullah
    Munro, Malcolm
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
  • [26] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [27] A new approach creating an anti-phishing seal
    Luca, Daniel L.
    [J]. 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
  • [28] A Novel Anti-phishing Effectiveness Evaluator Model
    Sankhwar, Shweta
    Pandey, Dhirendra
    Khan, R. A.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
  • [29] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection
    Alnajim, Abdullah
    Munro, Malcolm
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 405 - 410
  • [30] Model for Analysing Anti-Phishing Authentication Ceremonies
    Hatunic-Webster, Edina
    Mtenzi, Fred
    O'Shea, Brendan
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 144 - 150