Index Link

  • RootNode

Item

{"_buckets": {"deposit": "ff024d65-5563-4363-b04a-17ee46ecfc06"}, "_deposit": {"id": "4679", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4679"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4679", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Studying Email Filtering Approach to Identify Spear Phishing Attacks", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Electronic mail is used daily by millions of people tocommunicate around the world and it is a criticalapplication for many businesses. Because of the fame ofemails, the attackers utilize it to gather the sensitivedata. Beyond spam and phishing email designed to trickusers into revealing personal information, spearphishing email exploits computer network and gathersensitive information from targeted network. Nowadays,detecting and filtering are still the most feasible waysfor email security. This paper categorizes existing emailfiltering techniques and then proposes a filteringapproach for spear phishing email based on SupportVector Machine (SVM) Classifier. The proposed systemwill use features from different literature andcombination of these features together forms a featureset to identify spear phishing attacks."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Spear Phishing"}, {"interim": "Advanced Persistent Threat (APT)"}, {"interim": "Support Vector Machine (SVM)"}, {"interim": "Features Selection(FS)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Mon, Ei Ei"}, {"subitem_authors_fullname": "Kham, Nang Saing Moon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/340"}, "item_title": "Studying Email Filtering Approach to Identify Spear Phishing Attacks", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004679", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4679", "relation": {}, "relation_version_is_last": true, "title": ["Studying Email Filtering Approach to Identify Spear Phishing Attacks"], "weko_shared_id": -1}

Studying Email Filtering Approach to Identify Spear Phishing Attacks

http://hdl.handle.net/20.500.12678/0000004679
b1bf7216-a2ef-42d9-a8bb-f90ecf223a0c
ff024d65-5563-4363-b04a-17ee46ecfc06
Publication type
Article
Upload type
Publication
Title
Title Studying Email Filtering Approach to Identify Spear Phishing Attacks
Language en
Publication date 2016-02-25
Authors
Mon, Ei Ei
Kham, Nang Saing Moon
Description
Electronic mail is used daily by millions of people tocommunicate around the world and it is a criticalapplication for many businesses. Because of the fame ofemails, the attackers utilize it to gather the sensitivedata. Beyond spam and phishing email designed to trickusers into revealing personal information, spearphishing email exploits computer network and gathersensitive information from targeted network. Nowadays,detecting and filtering are still the most feasible waysfor email security. This paper categorizes existing emailfiltering techniques and then proposes a filteringapproach for spear phishing email based on SupportVector Machine (SVM) Classifier. The proposed systemwill use features from different literature andcombination of these features together forms a featureset to identify spear phishing attacks.
Keywords
Spear Phishing, Advanced Persistent Threat (APT), Support Vector Machine (SVM), Features Selection(FS)
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/340
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats