Phishing E-mail Detection Based on Structural Properties

نویسندگان

  • Madhusudhanan Chandrasekaran
  • Krishnan Narayanan
  • Shambhu Upadhyaya
چکیده

Phishing attacks pose a serious threat to end-users and commercial institutions alike. Majority of the present day phishing attacks employ e-mail as their primary carrier, in order to allure unsuspecting victims to visit the masqueraded website. While the recent defense mechanisms focus on detection by validating the authenticity of the website, very few approaches have been proposed which concentrate on detecting e-mail based phishing attacks based on the structural properties inherently present in the phishing e-mail. Also, phishing attacks growing in ingenuity as well as sophistication render most of existing browser based solutions weak. In this paper, we propose a novel technique to discriminate phishing e-mails from the legitimate e-mails using the distinct structural features present in them. The derived features, together with oneclass Support Vector Machine (SVM), can be used to efficiently classify phishing e-mails before it reaches the users inbox, essentially reducing the human exposure. Our prototype implementation sits between a user's mail transfer agent (MTA) and mail user agent (MUA) and processes each arriving e-mail even before it reaches the inbox. Using live email data, we demonstrate that our approach is able to detect a wide range of phishing e-mails with minimal performance overhead

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multistage Framework to Defend Against Phishing Attacks

Phishing scams pose a serious threat to end-users and commercial institutions alike. E-mail continues to be the favorite vehicle to perpetrate such scams, mainly due to its widespread use combined with the ability to easily spoof them. Several approaches, both generic and specialized, have been proposed to address this growing problem. However, phishing techniques, growing in ingenuity as well ...

متن کامل

Quantifying Phishing Susceptibility for Detection and Behavior Decisions

OBJECTIVE We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. BACKGROUND Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential sol...

متن کامل

A novel approach against E-mail attacks derived from user-awareness based techniques

A large part of modern day communications are carried out through the medium of E-mails, especially corporate communications. More and more people are using E-mail for personal uses too. Companies also send notifications to their customers in E-mail. In fact, in the Multinational business scenario E-mail is the most convenient and sought-after method of communication. Important features of E-ma...

متن کامل

E-Mail Classification for Phishing Defense

We discuss a classification-based approach for filtering phishing messages in an e-mail stream. Upon arrival, various features of every e-mail are extracted. This forms the basis of a classification process which detects potentially harmful phishing messages. We introduce various new features for identifying phishing e-mail and rank established as well as newly introduced features according to ...

متن کامل

Mitigating E-Mail Threats - A Web Content Based Application

The World Wide Web is a very powerful and interactive medium and its surveillance is unavoidable for information dissemination. Extracting valuable information from the vast unstructured data is a challenging and critical issue. Web content mining plays an important role in solving these issues. The applications of WWW are widespread and one among it is E-Mail communication. Due to its simple a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006