{"title":"一种新的网络钓鱼邮件过滤方法","authors":"A. Inomata, M. Rahman, Toshio Okamoto, E. Okamoto","doi":"10.1109/PACRIM.2005.1517265","DOIUrl":null,"url":null,"abstract":"We focus on phishing in the mail filtering research. So we define a sender reliance cost by the DNS inquiry and the contents analysis. In this paper, we propose the method to estimate these costs quantitatively. In this proposed method, the cost which characteristics settle Phishing is obtained from the actual proof experiment and we show the Phishing filter calculated from a result of the experiment. Furthermore, we report about the prototype which implemented that mail filter as an extension of MTA, and show the validity of the proposed method from these actual outputted data.","PeriodicalId":346880,"journal":{"name":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"A novel mail filtering method against phishing\",\"authors\":\"A. Inomata, M. Rahman, Toshio Okamoto, E. Okamoto\",\"doi\":\"10.1109/PACRIM.2005.1517265\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We focus on phishing in the mail filtering research. So we define a sender reliance cost by the DNS inquiry and the contents analysis. In this paper, we propose the method to estimate these costs quantitatively. In this proposed method, the cost which characteristics settle Phishing is obtained from the actual proof experiment and we show the Phishing filter calculated from a result of the experiment. Furthermore, we report about the prototype which implemented that mail filter as an extension of MTA, and show the validity of the proposed method from these actual outputted data.\",\"PeriodicalId\":346880,\"journal\":{\"name\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"volume\":\"123 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PACRIM.2005.1517265\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM.2005.1517265","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We focus on phishing in the mail filtering research. So we define a sender reliance cost by the DNS inquiry and the contents analysis. In this paper, we propose the method to estimate these costs quantitatively. In this proposed method, the cost which characteristics settle Phishing is obtained from the actual proof experiment and we show the Phishing filter calculated from a result of the experiment. Furthermore, we report about the prototype which implemented that mail filter as an extension of MTA, and show the validity of the proposed method from these actual outputted data.