Analysis of the core research for vendor email compromise filtering model using machine learning

Oleh Kozlenko, Dmytro Zibarov
{"title":"Analysis of the core research for vendor email compromise filtering model using machine learning","authors":"Oleh Kozlenko, Dmytro Zibarov","doi":"10.20535/tacs.2664-29132023.1.284121","DOIUrl":null,"url":null,"abstract":"Vendor email compromise became one of most sophisticated types of social engineering attacks. Strengths of this malicious activity rely on basis of impersonating vendor that company working with. Thus, it is easy for attacker to exploit this trust for doing different type of data exfiltration or ransom. To mitigate risks, that come with these challenges, information security specialist should consider using different types of approaches, including machine learning, to identify anomalies in email, so further damages can be prevented. The purpose of this work lies in the identification of optimal approach for VEC-style attacks detection and optimizing these approaches with least amount of false-positive (FP) parameters. The object of this research is different methods of text processing algorithms, including machine learning methods for detecting VEC emails. The subject of research in this paper mainly considers impact of mentioned text processing algorithms and its relation with efficiency of VEC email classification, identifying most effective approach and, also, how to improve results of such detections. Results of this paper consists of details for VEC-email attacks detection, challenges that comes with different approaches and proposed solution, that lies in using text processing techniques and agent-related approach with main sphere of implication – machine-learning systems, that are used for identifying social-engineering attacks through email.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"159 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical and applied cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20535/tacs.2664-29132023.1.284121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Vendor email compromise became one of most sophisticated types of social engineering attacks. Strengths of this malicious activity rely on basis of impersonating vendor that company working with. Thus, it is easy for attacker to exploit this trust for doing different type of data exfiltration or ransom. To mitigate risks, that come with these challenges, information security specialist should consider using different types of approaches, including machine learning, to identify anomalies in email, so further damages can be prevented. The purpose of this work lies in the identification of optimal approach for VEC-style attacks detection and optimizing these approaches with least amount of false-positive (FP) parameters. The object of this research is different methods of text processing algorithms, including machine learning methods for detecting VEC emails. The subject of research in this paper mainly considers impact of mentioned text processing algorithms and its relation with efficiency of VEC email classification, identifying most effective approach and, also, how to improve results of such detections. Results of this paper consists of details for VEC-email attacks detection, challenges that comes with different approaches and proposed solution, that lies in using text processing techniques and agent-related approach with main sphere of implication – machine-learning systems, that are used for identifying social-engineering attacks through email.
基于机器学习的厂商邮件泄露过滤模型的核心研究分析
供应商电子邮件攻击成为最复杂的社会工程攻击类型之一。这种恶意活动的优势依赖于与该公司合作的冒充供应商。因此,攻击者很容易利用这种信任来进行不同类型的数据泄露或勒索。为了降低这些挑战带来的风险,信息安全专家应该考虑使用不同类型的方法,包括机器学习,来识别电子邮件中的异常情况,从而防止进一步的损害。这项工作的目的在于识别vecc式攻击检测的最佳方法,并以最少的假阳性(FP)参数优化这些方法。本研究的对象是文本处理算法的不同方法,包括检测VEC邮件的机器学习方法。本文的研究主题主要考虑上述文本处理算法的影响及其与VEC电子邮件分类效率的关系,找出最有效的方法,以及如何改进这些检测结果。本文的结果包括电子邮件攻击检测的细节,不同方法带来的挑战和提出的解决方案,即使用文本处理技术和代理相关方法,其主要含义是机器学习系统,用于识别通过电子邮件进行的社会工程攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信