Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659691
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Detection of Phishing Emails Using Natural Language Processing Techniques

Abstract: Phishing refers to fraudulent social engineering techniques used to elicit sensitive information from unsuspecting victims. In this paper, our scheme is aimed at detecting phishing mails which do not contain any links but bank on the victim"s curiosity by luring them into replying with sensitive information. We exploit the common features among all such phishing emails such as nonmentioning of the victim"s name in the email, a mention of monetary incentive and a sentence inducing the recipient to reply. This t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…4. A consolidated features' list is given in Table 1 which includes the email, website, URL, and Social media features from various sources for phishing detection [2,3,5,10,12,23,25,35,36,38,42,48,49,58,59,63,66,68,74]. Different anti-phishing approaches use different algorithms to classify the phishing attacks from the legitimate ones.…”
Section: Anti-phishing Solutionsmentioning
confidence: 99%
“…4. A consolidated features' list is given in Table 1 which includes the email, website, URL, and Social media features from various sources for phishing detection [2,3,5,10,12,23,25,35,36,38,42,48,49,58,59,63,66,68,74]. Different anti-phishing approaches use different algorithms to classify the phishing attacks from the legitimate ones.…”
Section: Anti-phishing Solutionsmentioning
confidence: 99%
“…The success rate of spear phishing attacks is quite high because the information included in the email content exploits humans' emotional responses to fear, greed, sense of urgency, curiosity, trusted personal relationships and standard business correspondence (Kim, Shin, Kim, & Lee, 2011a). In this respect, urgency is a contributing factor in spear phishing users' vulnerability when they receive emails that require an urgent response as this may put the victims under unnecessary pressure preventing them from making rational decisions prior to responding to the email (Aggarwal, Kumar, & Sudarsan, 2014).…”
Section: User Vulnerabilities In Spear Phishingmentioning
confidence: 99%
“…When users out of curiosity respond to 'false negative emails', which are emails from unknown senders that contain innocuous looking sentences such as those asking about the health of the recipient or just a simple "how are you? ", the actual attack is carried out without the victim being aware (Aggarwal, Kumar, & Sudarsan, 2014). Therefore, while human carelessness is a critical vulnerability factor in phishing attacks, little empirical research has studied behaviors associated with information carelessness and the ways that people exploit this vulnerability (Workman, 2008).…”
Section: User Vulnerabilities In Spear Phishingmentioning
confidence: 99%
See 2 more Smart Citations