Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] THE EVOLUTION OF THREATS TO COMPANY'S FINANCIAL SECURITY
    Trydid, O. M.
    Orekhova, K., V
    Zelenska, M., V
    Fialkovska, I., V
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2015, 1 (18): : 88 - 102
  • [2] Editor's inbox
    Mendelson, HR
    QUINTESSENCE INTERNATIONAL, 2005, 36 (09): : 668 - 668
  • [3] Inventor's inbox
    Engineering and Technology, 2010, 5 (08): : 28 - 29
  • [4] THREATS TO COMPANY MINDS
    LORCH, E
    PHYSICS WORLD, 1995, 8 (10) : 15 - 16
  • [5] Inventor's inbox: Winged mirror
    Shean, Mark
    Andrews, Patrick
    Engineering and Technology, 2008, 2 (12): : 36 - 37
  • [6] IDENTIFYING EXTINCTION THREATS
    SISK, TD
    LAUNER, AE
    SWITKY, KR
    EHRLICH, PR
    BIOSCIENCE, 1994, 44 (09) : 592 - 604
  • [7] Inventor's inbox: Banking on railways
    Sheahan, Mark
    Andrews, Patrick
    Eng. Technol., 2008, 6 (32-33): : 32 - 33
  • [8] Inventor's inbox: Winged mirror
    Sheahan, Mark
    Andrews, Patrick
    Engineering and Technology, 2007, 2 (12): : 36 - 37
  • [9] Identifying and Mitigating Insider Threats
    Probst, Christian W.
    IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206
  • [10] Difficulties in identifying Company's Core Competencies and Core Processes
    Boguslauskas, Vytautas
    Kvedaraviciene, Goda
    INZINERINE EKONOMIKA-ENGINEERING ECONOMICS, 2009, (02): : 75 - 81