Identifying threats in a large company's inbox

被引:6
|
作者
Gallo, Luigi [1 ,2 ]
Botta, Alessio [2 ]
Ventre, Giorgio [2 ]
机构
[1] Cyber Secur Lab TIM SpA, Turin, Italy
[2] Univ Napoli Federico II, Naples, Italy
关键词
Security; Spam; Phishing; Machine Learning;
D O I
10.1145/3359992.3366637
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threats in emails continue to grow. Anti-spam filters have achieved good performance, but several spam emails still pass through them. Some of them are particularly dangerous as they represent attempts to breach the security policy of the company (e.g. inducing a manager to authorize a payment towards a fraudulent bank account). In this paper we propose an automated system to detect such emails, passing through antispam filter and potentially very dangerous. Our dataset is composed of real spam emails reported, collected, and labelled as critical or not by human analysts during each day of the last year in a large company's inbox. We firstly study the characteristics of dangerous emails and then train and use different supervised machine learning classifiers to detect them. Our results highlight the main distinguishing characteristics of such emails and that (a) Support Vector Machine and Random Forest classifiers achieve the best performance; (b) the full feature set considered allows to obtain up to 97% of recall and up to 92% of precision with supervised approaches; (c) highly dangerous spam emails can be easily detected with only 21 features.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [41] The opportunity and threats for the selected Ukraine company in the entering the international markets
    Sokil, Oksana
    Ubreziova, Iveta
    MANAGERIAL TRENDS IN THE DEVELOPMENT OF ENTERPRISES IN GLOBALIZATION ERA, 2017, : 219 - 226
  • [42] Model for Identifying Cyber Threats to Internet Information Resources
    I. V. Luskatov
    S. V. Pilkevich
    Automatic Control and Computer Sciences, 2019, 53 : 987 - 994
  • [43] Identifying security threats in ad hoc wireless network
    Hassan, K
    Conner, M
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 34 - 38
  • [44] Identifying Hotspots for Threats to Koalas Using Spatial Analysis
    Preece, H. J.
    MODSIM 2007: INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION: LAND, WATER AND ENVIRONMENTAL MANAGEMENT: INTEGRATED SYSTEMS FOR SUSTAINABILITY, 2007, : 1294 - 1300
  • [45] Model for Identifying Cyber Threats to Internet Information Resources
    Luskatov, I. V.
    Pilkevich, S. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 987 - 994
  • [46] Identifying threats from invasive alien species in Bangladesh
    Mukul, Sharif A.
    Arfin-Khan, Mohammed Abu Sayed
    Uddin, Mohammad Belal
    GLOBAL ECOLOGY AND CONSERVATION, 2020, 23
  • [47] Diffuse pollution threats to groundwater: a UK water company perspective
    Knapp, MF
    QUARTERLY JOURNAL OF ENGINEERING GEOLOGY AND HYDROGEOLOGY, 2005, 38 : 39 - 51
  • [48] Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
    Ling, Engla Rencelj
    Cabus, Jose Eduardo Urrea
    Butun, Ismail
    Lagerstrom, Robert
    Olegard, Johannes
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [49] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18
  • [50] THE FINE ART OF THE INSULT Notes from a Bookseller's Inbox 2
    Maggs, Ed
    BOOK COLLECTOR, 2012, 61 (03): : 435 - 438