E-Mail Classification for Phishing Defense
نویسندگان
چکیده
We discuss a classification-based approach for filtering phishing messages in an e-mail stream. Upon arrival, various features of every e-mail are extracted. This forms the basis of a classification process which detects potentially harmful phishing messages. We introduce various new features for identifying phishing e-mail and rank established as well as newly introduced features according to their significance for this classification problem. Moreover, in contrast to classical binary classification approaches (spam vs. not spam), a more refined ternary classification approach for filtering e-mail data is investigated which automatically distinguishes three message types: ham (solicited e-mail), spam, and phishing. Experiments with representative data sets illustrate that our approach yields significantly better classification results than existing phishing detection methods. Moreover, the direct ternary classification proposed is compared to a sequence of two binary classification processes. Direct onestep ternary classification is not only more efficient, but is also shown to achieve better accuracy than repeated binary classification.
منابع مشابه
Phishing E-mail Detection Based on Structural Properties
Phishing attacks pose a serious threat to end-users and commercial institutions alike. Majority of the present day phishing attacks employ e-mail as their primary carrier, in order to allure unsuspecting victims to visit the masqueraded website. While the recent defense mechanisms focus on detection by validating the authenticity of the website, very few approaches have been proposed which conc...
متن کاملThe Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that ma...
متن کاملFuzzing E-mail Filters with Generative Grammars and N-Gram Analysis
Phishing attacks remain a common attack vector in today’s IT threat landscape, and one of the primary means of preventing phishing attacks is e-mail filtering. Most e-mail filtering is done according to a either a signaturebased approach or using Bayesian models, so when specific signatures are detected the e-mail is either quarantined or moved to a Junk mailbox. Much like antivirus, though, a ...
متن کاملExperimental Study on Meta Heuristic Optimization Algorithms for Fake Website Detection
*Asst. Professor, Department of BCA, SS & IT, CMS College of Science & Commerce, Coimbatore, Tamil Nadu, INDIA E-mail: [email protected] **Associate Professor, Department of Computer Science & Engineering., Government College of Technology, Coimbatore, Tamil Nadu, INDIA Abstract: The convenience of online commerce has been embraced by consumers and criminals alike. Phishing, the act of st...
متن کاملDetection Technique by using Textual and URL analysis ”
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where user is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial institutions or getting access to private information. Phishing has increased enormously over the last years and is a serious threat to globa...
متن کامل