Jameel et al., 2013 - Google Patents
Detection of phishing emails using feed forward neural networkJameel et al., 2013
View PDF- Document ID
- 9868620735050373016
- Author
- Jameel N
- George L
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Phishing emails are messages designed to fool the recipient into handing over personal information, such as login names, passwords, credit card numbers, account credentials, social security numbers etc. Fraudulent emails harm their victims through loss of funds and …
- 230000001537 neural 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing | |
Karim et al. | A comprehensive survey for intelligent spam email detection | |
Jameel et al. | Detection of phishing emails using feed forward neural network | |
US10834127B1 (en) | Detection of business email compromise attacks | |
A. Hamid et al. | Hybrid feature selection for phishing email detection | |
Hamid et al. | Using feature selection and classification scheme for automating phishing email detection | |
Rawal et al. | Phishing detection in e-mails using machine learning | |
Saberi et al. | Learn to detect phishing scams using learning and ensemble? methods | |
RU2763921C1 (en) | System and method for creating heuristic rules for detecting fraudulent emails attributed to the category of bec attacks | |
Şentürk et al. | Email phishing detection and prevention by using data mining techniques | |
Taylor et al. | A model to detect spam email using support vector classifier and random forest classifier | |
Priya et al. | Detection of phishing websites using C4. 5 data mining algorithm | |
Igwilo et al. | Comparative analysis of ensemble learning and non-ensemble machine learning algorithms for phishing URL detection | |
Khonji et al. | Lexical URL analysis for discriminating phishing and legitimate e-mail messages | |
Mandela et al. | Comparison of ensemble models for the classification of malicious URLs | |
Seljan et al. | Information Extraction from Security-Related Datasets. | |
Patil et al. | Machine learning and deep learning for phishing page detection | |
Ahmad et al. | Detection of Phishing Attacks Using Machine Learning Techniques | |
Patil et al. | Machine learning approach for phishing website detection: A literature survey | |
Kathirvalavakumar et al. | Efficient harmful email identification using neural network | |
Azeez et al. | Identification of pharming in communication networks using ensemble learning | |
Jameel et al. | Detection phishing emails using features decisive values | |
Geerthik et al. | Filtering spam: Current trends and techniques | |
Pham et al. | Phishing attacks detection using genetic programming | |
Shahila et al. | AI Based Phishing Discrement for Immense E-Maildata |