On Automatically Detecting Malicious Impostor Emails
نویسندگان
چکیده
In this paper we explore the problem we call “malicious impostor emails.” Compared with the fairly well-known abuses such as spam and email worms, malicious impostor emails could be much more catastrophic because their payloads may directly target at the victim users’ cryptographic keys (via whatever means) and their content—except the malicious payload as an attachment—could look perfectly like a legitimate one. As a first step in dealing with malicious impostor emails, we present a partial solution that mitigates their damage without forcing the involvement of the users.
منابع مشابه
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class...
متن کاملA New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm
Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...
متن کاملA Distributed System for Detecting Phishing and Mail Alert based Malicious Tweet URLs Blocker in a Twitter Stream
Twitter is a hugely well-liked famous social network where people exchanges messages of 140 characters called tweets. Because of short content size, and use of URL, it is difficult to detect phishing on Twitter unlike emails. Ease of information exchange large audience makes Twitter as a popular medium to spread external content like articles, videos, and photographs by embedding URLs in tweets...
متن کاملDETECTING TARGETED MALICIOUS EMAIL THROUGH SUPERVISED CLASSIFICATION OF PERSISTENT THREAT AND RECIPIENT ORIENTED FEATURES by Rohan
Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME)...
متن کاملThat Ain't You: Detecting Spearphishing Emails Before They Are Sent
One of the ways in which attackers try to steal sensitive information from corporations is by sending spearphishing emails. This type of emails typically appear to be sent by one of the victim’s coworkers, but have instead been crafted by an attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to come from a trusted party, but were actually sent fr...
متن کامل