Hiroki Nishikawa, Takumi Yamamoto, B. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, M. Nishigaki
{"title":"Analysis of Malicious Email Detection using Cialdini’s Principles","authors":"Hiroki Nishikawa, Takumi Yamamoto, B. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, M. Nishigaki","doi":"10.1109/AsiaJCIS50894.2020.00032","DOIUrl":null,"url":null,"abstract":"This research proposes a technique for identifying the persuasion methods of attackers that are likely to appear in targeted emails. A “persuasion method” is a technique (such as impersonating a person of authority, or appealing to scarcity) which makes the recipient more psychologically willing to obey the will of the attacker. Estimating the presence of persuasion methods in email bodies using machine learning is expected to find application as an effective feature for detecting malicious email, and in tools for warning users that they are being persuaded.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This research proposes a technique for identifying the persuasion methods of attackers that are likely to appear in targeted emails. A “persuasion method” is a technique (such as impersonating a person of authority, or appealing to scarcity) which makes the recipient more psychologically willing to obey the will of the attacker. Estimating the presence of persuasion methods in email bodies using machine learning is expected to find application as an effective feature for detecting malicious email, and in tools for warning users that they are being persuaded.