Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails

被引:15
|
作者
Gascon, Hugo [1 ]
Ullrich, Steffen [2 ]
Stritter, Benjamin [3 ]
Rieck, Konrad [1 ]
机构
[1] TU Braunschweig, Braunschweig, Germany
[2] Genua GmbH, Kirchheim, Germany
[3] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
关键词
Spear-phishing; Email spoofing; Targeted attack detection;
D O I
10.1007/978-3-030-00470-5_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Spear-phishing is an effective attack vector for infiltrating companies and organisations. Based on the multitude of personal information available online, an attacker can craft seemingly legit emails and trick his victims into opening malicious attachments and links. Although anti-spoofing techniques exist, their adoption is still limited and alternative protection approaches are needed. In this paper, we show that a sender leaves content-agnostic traits in the structure of an email. Based on these traits, we develop a method capable of learning profiles for a large set of senders and identifying spoofed emails as deviations thereof. We evaluate our approach on over 700,000 emails from 16,000 senders and demonstrate that it can discriminate thousands of senders, identifying spoofed emails with 90% detection rate and less than 1 false positive in 10,000 emails. Moreover, we show that individual traits are hard to guess and spoofing only succeeds if entire emails of the sender are available to the attacker.
引用
收藏
页码:69 / 91
页数:23
相关论文
共 19 条
  • [1] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [2] Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content
    Lin, Tian
    Capecci, Daniel E.
    Ellis, Donovan M.
    Rocha, Harold A.
    Dommaraju, Sandeep
    Oliveira, Daniela S.
    Ebner, Natalie C.
    ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2019, 26 (05)
  • [3] Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme
    Sonowal, Gunikhan
    Sharma, Aditi
    Kharb, Latika
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (03): : 117 - +
  • [4] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [5] Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
    AlSabah, Mashael
    Nabeel, Mohamed
    Choo, Euijin
    Boshmaf, Yazan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 446 - 459
  • [6] Spear Phishing Emails Detection Based on Machine Learning
    Ding, Xiong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Qiuyun
    Xin, Liling
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 354 - 359
  • [7] Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Aparicio-Navarro, Francisco J.
    Rabie, Khaled
    Jabban, Ahmad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [8] Efficient Spear-phishing Threat Detection Using Hypervisor Monitor
    Lin, Chih-Hung
    Tien, Chin-Wei
    Chen, Chih-Wei
    Tien, Chia-Wei
    Pao, Hsing-Kuo
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 299 - 303
  • [9] Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks
    Martin, Jaclyn
    Dube, Chad
    Coovert, Michael D.
    HUMAN FACTORS, 2018, 60 (08) : 1179 - 1191
  • [10] Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph
    Alabdulmohsin, Ibrahim
    Han, Yufei
    Shen, Yun
    Zhang, Xiangliang
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2395 - 2400