Mitigating E-Mail Threats - A Web Content Based Application
نویسندگان
چکیده
The World Wide Web is a very powerful and interactive medium and its surveillance is unavoidable for information dissemination. Extracting valuable information from the vast unstructured data is a challenging and critical issue. Web content mining plays an important role in solving these issues. The applications of WWW are widespread and one among it is E-Mail communication. Due to its simple and inherently vulnerable nature, e-mail communication is harmed for various purposes. E-mail spamming, phishing, relay hijacking, Denial of service attacks, cyber bullying, child pornography, and sexual harassment are some common E-mail mediated cyber crimes. It becomes very essential to provide a protective mechanism for securing E-Mail systems. Content based web mining plays a vital role in the detection of E-Mail threats by examining the contents of suspected e-mail accounts to gather evidence during malicious behavior. There are various techniques available with different approaches and this paper is based on Content based filtering methods with machine learning algorithms. Index Terms —Content Mining, Data Leakage, E-Mail threats, Spam, Phishing
منابع مشابه
Mitigating risk in ecommerce transactions: perceptions of information credibility and the role of user-generated ratings in product quality and purchase intention
Although extremely popular, electronic commerce environments often lack information that has traditionally served to ensure trust among exchange partners. Digital technologies, however, have created new forms of “electronic word-of-mouth,” which offer new potential for gathering credible information that guides consumer behaviors. We conducted a nationally representative survey and a focused ex...
متن کاملMitigating the risk of insider threats when sharing credentials
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharing in home networks to address the problem of unauthorized confidential content sharing in organizations. In particular it focuses on how to achieve secure content sharing between employees in a group while limiting content leakage to unauthorized individuals outside the group. The thesis discusse...
متن کاملImage flip CAPTCHA
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...
متن کاملCountering Cross-Site Scripting in Web-based Applications
Today’s dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security pr...
متن کاملWhen the cloud improves security
Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats When the cloud improves security …move protection to where the threats are Executive summary Malware threats are on the rise and the attacks are growing in sophistication and complexity. Individuals and specifi...
متن کامل