2020
DOI: 10.2197/ipsjjip.28.222
|View full text |Cite
|
Sign up to set email alerts
|

Zero-day Malicious Email Investigation and Detection Using Features with Deep-learning Approach

Abstract: Cyber hackers use email as a tool to trick, inject or drop malicious software into the recipient's device. Everyday users have to face off against, phishing or malicious emails and it would be a huge problem for whole organizations even if only one user clicked on a single link from this malicious email. The difficult issue is how to classify and detect those malicious emails from ordinary, especially spear phishing emails, which are designed for a particular target, or zero-day malicious emails that no one ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The additional enhancement will soon be needed since the development in hardware is slower than the improvement in DL computing power, which limits DL models' performance. Furthermore, complex DL models using GPUs and TPUs in their implementation have specific 2 Alexa https://www.alexa.com/ Amazon - [21], [33], [43], [45], [48], [77], [96], [97], [99], [101], [105] 3 DMOZ https://dmoz-odp.org/ https://dmoztools.net/docs/en/rdf.html Open Directory Project - [43], [58], [82], [88], [91], [93], [ effects on the environment and energy consumption. Carbon dioxide emitted from such models is approximately five times an average car's lifetime emission.…”
Section: ) Computational Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…The additional enhancement will soon be needed since the development in hardware is slower than the improvement in DL computing power, which limits DL models' performance. Furthermore, complex DL models using GPUs and TPUs in their implementation have specific 2 Alexa https://www.alexa.com/ Amazon - [21], [33], [43], [45], [48], [77], [96], [97], [99], [101], [105] 3 DMOZ https://dmoz-odp.org/ https://dmoztools.net/docs/en/rdf.html Open Directory Project - [43], [58], [82], [88], [91], [93], [ effects on the environment and energy consumption. Carbon dioxide emitted from such models is approximately five times an average car's lifetime emission.…”
Section: ) Computational Constraintsmentioning
confidence: 99%
“…DL requires a significant amount of data and time to train the model [103]. Datasets used for training neural networks usually contain millions of samples [44], [45], [81], [88], [98]. As a result, they need a longer time to train the model to obtain high-performance accuracy.…”
Section: ) Time Complexitymentioning
confidence: 99%
“…Phomkeona and Okamura [ 16 ] proposed a method for categorizing and diagnosing zero-day malicious emails based on data gathered from the email header and content. They merged it with dynamic analytic data as a collection of 27 features, including machine translation detection, risk word detection, and other characteristics, using numerous application programming interfaces.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sanouphab Phomkeona and Okamura [12] proposed a new method to extract features from email and a deep-learning approach to detect zero-day malware spam. They extracted some features from e-mail's header and body parts that included risk words detected, machine translation detected, and other features by using several APIs.…”
Section: Rastenis Et Al (2021)mentioning
confidence: 99%