{"title":"使用NLP技术检测和分析网络钓鱼电子邮件","authors":"Rian Sh. Al-Yozbaky, M. Alanezi","doi":"10.1109/HORA58378.2023.10156738","DOIUrl":null,"url":null,"abstract":"The most common detrimental technique used by attackers to deceive victims into disclosing personal information is phishing, in which they pose as trustworthy individuals or organizations often via email. Although fake email attacks are a common tactic used by cybercriminals, their use has recently increased as attacker's profit from victims' anxiety. As a result, further study is required to determine how to recognize bogus emails. This paper proposed a new model to extract the Arabic email content and compare it using three determinants based on neural language programming (NLP) for the purpose of discovering whether it is a legitimate email or a phishing email. The first is a black list of Arabic common phishing words, the roots of a black list of Arabic common phishing words, and a list of Arabic common phishing sentences, the best two results for applying the above conditions were (99% Legal and 96% Phishing) when using the three conditions together and (99% Legal and 94% Phishing) when using a blacklist of common words of phishing, and then will present and discuss the results obtained.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection and Analyzing Phishing Emails Using NLP Techniques\",\"authors\":\"Rian Sh. Al-Yozbaky, M. Alanezi\",\"doi\":\"10.1109/HORA58378.2023.10156738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The most common detrimental technique used by attackers to deceive victims into disclosing personal information is phishing, in which they pose as trustworthy individuals or organizations often via email. Although fake email attacks are a common tactic used by cybercriminals, their use has recently increased as attacker's profit from victims' anxiety. As a result, further study is required to determine how to recognize bogus emails. This paper proposed a new model to extract the Arabic email content and compare it using three determinants based on neural language programming (NLP) for the purpose of discovering whether it is a legitimate email or a phishing email. The first is a black list of Arabic common phishing words, the roots of a black list of Arabic common phishing words, and a list of Arabic common phishing sentences, the best two results for applying the above conditions were (99% Legal and 96% Phishing) when using the three conditions together and (99% Legal and 94% Phishing) when using a blacklist of common words of phishing, and then will present and discuss the results obtained.\",\"PeriodicalId\":247679,\"journal\":{\"name\":\"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HORA58378.2023.10156738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HORA58378.2023.10156738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection and Analyzing Phishing Emails Using NLP Techniques
The most common detrimental technique used by attackers to deceive victims into disclosing personal information is phishing, in which they pose as trustworthy individuals or organizations often via email. Although fake email attacks are a common tactic used by cybercriminals, their use has recently increased as attacker's profit from victims' anxiety. As a result, further study is required to determine how to recognize bogus emails. This paper proposed a new model to extract the Arabic email content and compare it using three determinants based on neural language programming (NLP) for the purpose of discovering whether it is a legitimate email or a phishing email. The first is a black list of Arabic common phishing words, the roots of a black list of Arabic common phishing words, and a list of Arabic common phishing sentences, the best two results for applying the above conditions were (99% Legal and 96% Phishing) when using the three conditions together and (99% Legal and 94% Phishing) when using a blacklist of common words of phishing, and then will present and discuss the results obtained.