Email Summarization to Assist Users in Phishing Identification

03/24/2022
by   Amir Kashapov, et al.
0

Cyber-phishing attacks recently became more precise, targeted, and tailored by training data to activate only in the presence of specific information or cues. They are adaptable to a much greater extent than traditional phishing detection. Hence, automated detection systems cannot always be 100 increasing the uncertainty around expected behavior when faced with a potential phishing email. On the other hand, human-centric defence approaches focus extensively on user training but face the difficulty of keeping users up to date with continuously emerging patterns. Therefore, advances in analyzing the content of an email in novel ways along with summarizing the most pertinent content to the recipients of emails is a prospective gateway to furthering how to combat these threats. Addressing this gap, this work leverages transformer-based machine learning to (i) analyze prospective psychological triggers, to (ii) detect possible malicious intent, and (iii) create representative summaries of emails. We then amalgamate this information and present it to the user to allow them to (i) easily decide whether the email is "phishy" and (ii) self-learn advanced malicious patterns.

READ FULL TEXT

page 1

page 2

page 3

research
08/19/2019

Automated email Generation for Targeted Attacks using Natural Language

With an increasing number of malicious attacks, the number of people and...
research
03/27/2021

Dark Patterns in the Interaction with Cookie Banners

Dark patterns are interface designs that nudge users towards behavior th...
research
09/05/2021

A Transformer-based Model to Detect Phishing URLs

Phishing attacks are among emerging security issues that recently draws ...
research
08/30/2021

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning

Protecting and preventing sensitive data from being used inappropriately...
research
01/23/2019

Context-Sensitive Malicious Spelling Error Correction

Misspelled words of the malicious kind work by changing specific keyword...
research
04/21/2021

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Intrusion Detection Systems (IDS) enhanced with Machine Learning (ML) ha...
research
07/28/2022

Exploiting and Defending Against the Approximate Linearity of Apple's NeuralHash

Perceptual hashes map images with identical semantic content to the same...

Please sign up or login with your details

Forgot password? Click here to reset