Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [21] An Applied Econometrician's View of Large Company Performance
    P. A. Geroski
    Review of Industrial Organization, 1998, 13 : 271 - 294
  • [22] Identifying Digital Threats in a Hacker Web Forum
    Macdonald, Mitch
    Frank, Richard
    Mei, Joseph
    Monk, Bryan
    PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 926 - 933
  • [23] Fundamental Approaches to Identifying Threats to Economic Security
    Murzina, Elena A.
    Yalyalieva, Tatiana V.
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 3347 - 3350
  • [24] Identifying Email Threats Using Predictive Analysis
    Zeng, Yuanyuan Grace
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [25] Identifying and Prioritizing Architectural Debt Through Architectural Smells: A Case Study in a Large Software Company
    Martini, Antonio
    Fontana, Francesca Arcelli
    Biaggi, Andrea
    Roveda, Riccardo
    SOFTWARE ARCHITECTURE (ECSA 2018), 2018, 11048 : 320 - 335
  • [26] Identifying Indicators of Insider Threats: Insider IT Sabotage
    Claycomb, William R.
    Huth, Carly L.
    Phillips, Brittany
    Flynn, Lori
    McIntire, David
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [27] IDENTIFYING SEPARATION THREATS IN FAMILY-THERAPY
    ARGLES, P
    JOURNAL OF MARITAL AND FAMILY THERAPY, 1983, 9 (02) : 209 - 211
  • [29] Company strategies. Large scale distribution in the line of sight of the D S Smith company
    Le Roux, C.
    Cartonnages Emballages Modernes, 2010, (719): : 38 - 39
  • [30] 'PROMETHEUS UNBOUND' Notes from a Bookseller's Inbox I
    Maggs, Ed
    BOOK COLLECTOR, 2011, 60 (04): : 585 - 589