Email Security Detection Solution Based on Multi-Scenario Classification

Authors

  • Xin Liu

DOI:

https://doi.org/10.54097/pb830p09

Keywords:

Phishing Emails, Email Security Detection, Multi-scenario Classification

Abstract

In the backdrop of the rapidly advancing global network informatization, cybercriminals frequently utilize a variety of phishing emails to launch attacks against numerous crucial organizations and information systems. Once these attacks succeed, they can inflict substantial damage on physical and digital systems as well as assets, resulting in the leakage of sensitive information, reputation impairment, and economic losses. The issue of how to detect phishing emails from a vast number of emails has long drawn significant attention. However, with the increasingly complex deception techniques of phishing emails, the existing solutions for detecting phishing attacks are no longer sufficient to tackle these problems. In this paper, a multi - scenario classification - based email security detection scheme is proposed. By analyzing the different stylistic features and deception differences of emails in various application scenarios, the collected email datasets are classified into multiple scenarios. Subsequently, the Long Short - Term Memory (LSTM) is employed to train the data under different classifications, and the trained model is used to classify phishing emails. The results demonstrate that the detection scheme proposed in this study exhibits relatively high accuracy.

Downloads

Download data is not yet available.

References

[1] CHEN P, DESMET L, HUYGENS C. A study on advanced persistent threats[A]. Communications and Multimedia Security-15th International Conference[C]. 2014. 63-72.

[2] NIKOS V, DIMITRI G. The big four—what we did wrong in advanced persistent threat detection[A]. International Conference on Availability, Reliability and Security[C]. 2013. 248-254.

[3] YANG G M Z, TIAN Z H, DUAN W L. The prevent of advanced persistent threat[J]. Journal of Chemical and Pharmaceutical Research, 2015, 6(1):572-576.

[4] FRIEDBERG I, SKOPIK F, SETTANNI G, et al. Combating advanced persistent threats: from network event correlation to incident detection[J]. Computers & Security, 2015, 48(2):35-57.

[5] BUTT M I A. BIOS integrity: an advanced persistent threat[A]. Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security[C]. 2014. 47-50.

[6] CHRISTOS X, CHRISTOFOROS N. Advanced persistent threat in 3G networks: attacking the home network from roaming networks[J]. Computers & Security, 2015, 40(2): 84-94.

[7] ZHAO W T, ZHANG P F, ZHANG F. Extended Petri net-based advanced persistent threat analysis model[J]. Lecture Notes in Electrical Engineering LNEE, 2014, 277: 1297-1305.

[8] GIURA P, WANG W. Using large scale distributed computing to unveil advanced persistent threats[J]. Science, 2013, 1(3): 93-105.

[9] A. Litan, “Phishing victims likely will suffer identity theft fraud,” Gartner Res., ID Number: FT-22-8873, 2004.

[10] A. Vishwanath, T. Herath, R. Chen, J. Wang, and H. R. Rao, “Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model,” Decis. Support Syst., vol. 51, no. 3, pp. 576–586, Jun. 2011, doi: 10.1016/j.dss.2011.03.002.

[11] A. Abbasi, F. Mariam Zahedi, D. Zeng, Y. Chen, H. Chen, and J. F. Nunamaker Jr, “Enhancing predictive analytics for anti-phishing by exploiting website genre information,” J. Manage. Inf. Syst., vol. 31, no. 4, pp. 109–157, 2015.

[12] T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. ACM, vol. 50, no. 10, pp. 94–100, 2007.

[13] T. Moore and R. Clayton, “Examining the impact of website take-down on phishing,” in Proc. Anti-Phishing Work. Groups 2nd Annu. eCrime Res. Summit, 2007, pp. 1–13.

[14] A. Abbasi, F. Mariam Zahedi, D. Zeng, Y. Chen, H. Chen, and J. F. Nunamaker Jr, “Enhancing predictive analytics for anti-phishing by exploiting website genre information,” J. Manage. Inf. Syst., vol. 31, no. 4, pp. 109–157, 2015.

[15] G. Park and J. M. Taylor, “Using syntactic features for phishing detection,” 2015, arXiv150600037.

[16] R. Valecha, P. Mandaokar and H. R. Rao, "Phishing Email Detection Using Persuasion Cues," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 747-756, 1 March-April 2022, doi: 10.1109/TDSC.2021.3118931.

[17] M. Chandrasekaran, K. Narayanan and S. Upadhyaya, Phishing email detection based on structural properties, in Proc. of the NYS Cyber Security Conference (2006), pp. 1–7.

[18] Gascon H , Ullrich S , Stritter B ,et al.Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails [C]// 2018.DOI:10.1007/978-3-030-00470-5_4.

Downloads

Published

27-02-2025

Issue

Section

Articles

How to Cite

Liu, X. (2025). Email Security Detection Solution Based on Multi-Scenario Classification. Frontiers in Computing and Intelligent Systems, 11(2), 110-114. https://doi.org/10.54097/pb830p09