2015
DOI: 10.1007/978-3-319-20550-2_5
|View full text |Cite
|
Sign up to set email alerts
|

That Ain’t You: Blocking Spearphishing Through Behavioral Modelling

Abstract: Abstract. One of the ways in which attackers steal sensitive information from corporations is by sending spearphishing emails. A typical spearphishing email appears to be sent by one of the victim's coworkers or business partners, but has instead been crafted by the attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to be written by a certain person, but are also sent by that person's email account, which has been compromised. Spearphishing emails are very dange… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 49 publications
(30 citation statements)
references
References 19 publications
0
29
0
1
Order By: Relevance
“…Lynch (2005) analyses phishing, where criminals send fake emails that seem to be official online services and make their victims type in their credentials on a fake site. Likewise, spear phishing attacks include fraudulent emails which are aimed at one or a specific group of users (Stringhini and Thonnard 2015). Another method used is to infect users with malware that steals information because their devices are not properly prepared to counter the threat (Stone-Gross et al 2009).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Lynch (2005) analyses phishing, where criminals send fake emails that seem to be official online services and make their victims type in their credentials on a fake site. Likewise, spear phishing attacks include fraudulent emails which are aimed at one or a specific group of users (Stringhini and Thonnard 2015). Another method used is to infect users with malware that steals information because their devices are not properly prepared to counter the threat (Stone-Gross et al 2009).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Masquerade attacks on written documents have been studied previously [1], but in the email context have not been studied previously to our knowledge. Cues in the context of phishing and spear-phishing were studied previously in [46,40]. The authors in [46] also studied cognitive load indirectly through a survey question.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers in [40] used user behavioral model for distinguishing a real email and an email which is written by someone pretending to be the actual author. This model includes frequent interactions with certain people, sending emails at specific hours of the day, and using certain greetings and modal words in their emails.…”
Section: Related Workmentioning
confidence: 99%
“…The system proposed, Monarch, performs realtime filtering of scam, phishing and malware URLs that are submitted to web services through the use of linear classification with the combination of iterative parameter mixing and subgradient L1-regularisation; calculating an overall accuracy of 91% and 0.87% false positive margin. Stringhini and Thonnard [2015] have recently developed a system for classifying and blocking spear phishing emails from compromised email accounts by training a support vector machine based system with a behavioural model based on a user's email habits. The system collects and profiles behavioural features associated to writing (e.g., character/word frequency, punctuation, stylus), composition and sending (e.g., time/date, URL characterises, email chain content) and interaction (e.g., email contacts).…”
Section: Technicalmentioning
confidence: 99%