Obtaining the threat model for e-mail phishing

نویسندگان

  • Cleber K. Olivo
  • Altair Olivo Santin
  • Luiz Eduardo Soares de Oliveira
چکیده

Phishing is a kind of embezzlement that uses social engineering in order to obtain personal information from its victims, aiming to cause losses. In the technical literature only the hit rate of the classifiers is mentioned to justify the effectiveness of the phishing detecting techniques. Aspects such as the accuracy of the classifier results (false positive rate), computational effort and the number of features used for vailable online xxx

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phishing E-mail Detection Based on Structural Properties

Phishing attacks pose a serious threat to end-users and commercial institutions alike. Majority of the present day phishing attacks employ e-mail as their primary carrier, in order to allure unsuspecting victims to visit the masqueraded website. While the recent defense mechanisms focus on detection by validating the authenticity of the website, very few approaches have been proposed which conc...

متن کامل

Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis

Phishing attacks remain a common attack vector in today’s IT threat landscape, and one of the primary means of preventing phishing attacks is e-mail filtering. Most e-mail filtering is done according to a either a signaturebased approach or using Bayesian models, so when specific signatures are detected the e-mail is either quarantined or moved to a Junk mailbox. Much like antivirus, though, a ...

متن کامل

Detection Technique by using Textual and URL analysis ”

Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where user is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial institutions or getting access to private information. Phishing has increased enormously over the last years and is a serious threat to globa...

متن کامل

A Multistage Framework to Defend Against Phishing Attacks

Phishing scams pose a serious threat to end-users and commercial institutions alike. E-mail continues to be the favorite vehicle to perpetrate such scams, mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been proposed to address this growing problem. However, phishing techniques, growing in ingenuity as well ...

متن کامل

Experimental Study on Meta Heuristic Optimization Algorithms for Fake Website Detection

*Asst. Professor, Department of BCA, SS & IT, CMS College of Science & Commerce, Coimbatore, Tamil Nadu, INDIA E-mail: [email protected] **Associate Professor, Department of Computer Science & Engineering., Government College of Technology, Coimbatore, Tamil Nadu, INDIA Abstract: The convenience of online commerce has been embraced by consumers and criminals alike. Phishing, the act of st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Appl. Soft Comput.

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2013