{"title":"恶意电子邮件检测解决方案的初步架构和试点实现","authors":"Cosmina Stalidi, E. Popovici, G. Suciu","doi":"10.1109/ECAI58194.2023.10193949","DOIUrl":null,"url":null,"abstract":"Cyber-attacks are one of the most common and dangerous actions that can affect the activity of a small business, when personal data or any other type of sensitive information are stolen. The aim of this paper is to present a preliminary architecture and a pilot implementation, created around a plug-in, that detects malicious emails. The main idea is to collect a series of emails with suspected malicious content, to use text mining techniques to identify the essential words in the emails, and to create classification models that the plug-in could use to detect malicious emails. The pilot implementation was tested on several emails both malicious and clean, the include plug-in being able to distinguish the emails that are a source of infection with a high degree of accuracy. The novelty of our work consists in the resulting efficient and easy to use tool, based on Machine Learning algorithms, appropriate in the environment of small enterprises.","PeriodicalId":391483,"journal":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution\",\"authors\":\"Cosmina Stalidi, E. Popovici, G. Suciu\",\"doi\":\"10.1109/ECAI58194.2023.10193949\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber-attacks are one of the most common and dangerous actions that can affect the activity of a small business, when personal data or any other type of sensitive information are stolen. The aim of this paper is to present a preliminary architecture and a pilot implementation, created around a plug-in, that detects malicious emails. The main idea is to collect a series of emails with suspected malicious content, to use text mining techniques to identify the essential words in the emails, and to create classification models that the plug-in could use to detect malicious emails. The pilot implementation was tested on several emails both malicious and clean, the include plug-in being able to distinguish the emails that are a source of infection with a high degree of accuracy. The novelty of our work consists in the resulting efficient and easy to use tool, based on Machine Learning algorithms, appropriate in the environment of small enterprises.\",\"PeriodicalId\":391483,\"journal\":{\"name\":\"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECAI58194.2023.10193949\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECAI58194.2023.10193949","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution
Cyber-attacks are one of the most common and dangerous actions that can affect the activity of a small business, when personal data or any other type of sensitive information are stolen. The aim of this paper is to present a preliminary architecture and a pilot implementation, created around a plug-in, that detects malicious emails. The main idea is to collect a series of emails with suspected malicious content, to use text mining techniques to identify the essential words in the emails, and to create classification models that the plug-in could use to detect malicious emails. The pilot implementation was tested on several emails both malicious and clean, the include plug-in being able to distinguish the emails that are a source of infection with a high degree of accuracy. The novelty of our work consists in the resulting efficient and easy to use tool, based on Machine Learning algorithms, appropriate in the environment of small enterprises.