2022
DOI: 10.3390/electronics12010042
|View full text |Cite
|
Sign up to set email alerts
|

Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review

Abstract: The risk of cyberattacks against businesses has risen considerably, with Business Email Compromise (BEC) schemes taking the lead as one of the most common phishing attack methods. The daily evolution of this assault mechanism’s attack methods has shown a very high level of proficiency against organisations. Since the majority of BEC emails lack a payloader, they have become challenging for organisations to identify or detect using typical spam filtering and static feature extraction techniques. Hence, an effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 51 publications
0
10
0
Order By: Relevance
“…When it comes to business email compromise (BEC) attacks, machine learning can be a valuable tool in detecting and preventing such threats. Machine learning can help combat BEC attacks in several ways [ 29 ]. Firstly, it can be used to analyze historical email data and identify patterns associated with known BEC attacks.…”
Section: Related Workmentioning
confidence: 99%
“…When it comes to business email compromise (BEC) attacks, machine learning can be a valuable tool in detecting and preventing such threats. Machine learning can help combat BEC attacks in several ways [ 29 ]. Firstly, it can be used to analyze historical email data and identify patterns associated with known BEC attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In cybersecurity, NLP techniques are utilized for text analysis, sentiment analysis, and language-based threat detection (Aghaei et al, 2022). By processing and analyzing textual data from various sources such as emails, social media, and chat logs, NLP algorithms can identify indicators of compromise, phishing attempts, and other malicious activities (Atlam, and Oluwatimilehin, 2022). Deep learning, a subset of ML, involves artificial neural networks with multiple layers of interconnected nodes.…”
Section: Theoretical Foundationsmentioning
confidence: 99%
“…Business Email Compromise (BEC) represents a sophisticated and continually evolving cyber threat that poses substantial risks to organizational integrity and financial security. BEC attacks involve the impersonation of a trusted or reputable source through fraudulent emails [21]. This section scrutinizes the intricate landscape of BEC, elucidating the nuanced tactics employed by threat actors.…”
Section: Phishing In the Context Of Iotmentioning
confidence: 99%