E-Mail Classification for Phishing Defense

作者: Wilfried N. Gansterer , David Pölz

DOI: 10.1007/978-3-642-00958-7_40

关键词: Data miningPhishingBasis (linear algebra)Contrast (statistics)One-class classificationRank (computer programming)Binary classificationComputer scienceSequenceSupport vector machine

摘要: We discuss a classification-based approach for filtering phishing messages in an e-mail stream. Upon arrival, various features of every are extracted. This forms the basis classification process which detects potentially harmful messages. introduce new identifying and rank established as well newly introduced according to their significance this problem. Moreover, contrast classical binary approaches (spam vs. not spam), more refined ternary data is investigated automatically distinguishes three message types: ham (solicited e-mail), spam, phishing. Experiments with representative sets illustrate that our yields better results than existing detection methods. direct proposed compared sequence two processes. Direct one-step only efficient, but also shown achieve accuracy repeated classification.

参考文章(21)
Wilfried N. Gansterer, Andreas G. K. Janecek, Robert Neumayer, Spam Filtering Based on Latent Semantic Indexing Springer, London. pp. 165- 183 ,(2008) , 10.1007/978-1-84800-046-9_9
Eugene J. Koontz, Jonathan J. Oliver, Christine E. Drake, Anatomy of a Phishing Email. conference on email and anti-spam. ,(2004)
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi, SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks Lecture Notes in Computer Science. pp. 195- 209 ,(2005) , 10.1007/11599593_15
M. Chandrasekaran, R. Chinchani, S. Upadhyaya, PHONEY: mimicking user response to detect phishing attacks world of wireless, mobile and multimedia networks. pp. 668- 672 ,(2006) , 10.1109/WOWMOM.2006.87
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, Elizabeth Nunge, Protecting people from phishing: the design and evaluation of an embedded training email system human factors in computing systems. pp. 905- 914 ,(2007) , 10.1145/1240624.1240760
Wenyin Liu, Xiaotie Deng, Guanglin Huang, A.Y. Fu, An antiphishing strategy based on visual similarity assessment IEEE Internet Computing. ,vol. 10, pp. 58- 65 ,(2006) , 10.1109/MIC.2006.23
Min Wu, Robert C. Miller, Simson L. Garfinkel, Do security toolbars actually prevent phishing attacks human factors in computing systems. pp. 601- 610 ,(2006) , 10.1145/1124772.1124863
Andreas G.K. Janecek, Wilfried N. Gansterer, K. Ashwin Kumar, Multi-Level Reputation-Based Greylisting availability, reliability and security. pp. 10- 17 ,(2008) , 10.1109/ARES.2008.187
Thomas R. Lynam, Gordon V. Cormack, David R. Cheriton, On-line spam filter fusion Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '06. pp. 123- 130 ,(2006) , 10.1145/1148170.1148195