Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ff024d65-5563-4363-b04a-17ee46ecfc06"}, "_deposit": {"id": "4679", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4679"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4679", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Studying Email Filtering Approach to Identify Spear Phishing Attacks", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Electronic mail is used daily by millions of people tocommunicate around the world and it is a criticalapplication for many businesses. Because of the fame ofemails, the attackers utilize it to gather the sensitivedata. Beyond spam and phishing email designed to trickusers into revealing personal information, spearphishing email exploits computer network and gathersensitive information from targeted network. Nowadays,detecting and filtering are still the most feasible waysfor email security. This paper categorizes existing emailfiltering techniques and then proposes a filteringapproach for spear phishing email based on SupportVector Machine (SVM) Classifier. The proposed systemwill use features from different literature andcombination of these features together forms a featureset to identify spear phishing attacks."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Spear Phishing"}, {"interim": "Advanced Persistent Threat (APT)"}, {"interim": "Support Vector Machine (SVM)"}, {"interim": "Features Selection(FS)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/340"}, "item_title": "Studying Email Filtering Approach to Identify Spear Phishing Attacks", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004679", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4679", "relation": {}, "relation_version_is_last": true, "title": ["Studying Email Filtering Approach to Identify Spear Phishing Attacks"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Studying Email Filtering Approach to Identify Spear Phishing Attacks

http://hdl.handle.net/20.500.12678/0000004679
http://hdl.handle.net/20.500.12678/0000004679
b1bf7216-a2ef-42d9-a8bb-f90ecf223a0c
ff024d65-5563-4363-b04a-17ee46ecfc06
Publication type
Article
Upload type
Publication
Title
Title Studying Email Filtering Approach to Identify Spear Phishing Attacks
Language en
Publication date 2016-02-25
Authors
Mon, Ei Ei
Kham, Nang Saing Moon
Description
Electronic mail is used daily by millions of people tocommunicate around the world and it is a criticalapplication for many businesses. Because of the fame ofemails, the attackers utilize it to gather the sensitivedata. Beyond spam and phishing email designed to trickusers into revealing personal information, spearphishing email exploits computer network and gathersensitive information from targeted network. Nowadays,detecting and filtering are still the most feasible waysfor email security. This paper categorizes existing emailfiltering techniques and then proposes a filteringapproach for spear phishing email based on SupportVector Machine (SVM) Classifier. The proposed systemwill use features from different literature andcombination of these features together forms a featureset to identify spear phishing attacks.
Keywords
Spear Phishing, Advanced Persistent Threat (APT), Support Vector Machine (SVM), Features Selection(FS)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/340
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:16:01.714010
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL