Detection and Analyzing Phishing Emails Using NLP Techniques

Rian Sh. Al-Yozbaky, M. Alanezi
{"title":"Detection and Analyzing Phishing Emails Using NLP Techniques","authors":"Rian Sh. Al-Yozbaky, M. Alanezi","doi":"10.1109/HORA58378.2023.10156738","DOIUrl":null,"url":null,"abstract":"The most common detrimental technique used by attackers to deceive victims into disclosing personal information is phishing, in which they pose as trustworthy individuals or organizations often via email. Although fake email attacks are a common tactic used by cybercriminals, their use has recently increased as attacker's profit from victims' anxiety. As a result, further study is required to determine how to recognize bogus emails. This paper proposed a new model to extract the Arabic email content and compare it using three determinants based on neural language programming (NLP) for the purpose of discovering whether it is a legitimate email or a phishing email. The first is a black list of Arabic common phishing words, the roots of a black list of Arabic common phishing words, and a list of Arabic common phishing sentences, the best two results for applying the above conditions were (99% Legal and 96% Phishing) when using the three conditions together and (99% Legal and 94% Phishing) when using a blacklist of common words of phishing, and then will present and discuss the results obtained.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HORA58378.2023.10156738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The most common detrimental technique used by attackers to deceive victims into disclosing personal information is phishing, in which they pose as trustworthy individuals or organizations often via email. Although fake email attacks are a common tactic used by cybercriminals, their use has recently increased as attacker's profit from victims' anxiety. As a result, further study is required to determine how to recognize bogus emails. This paper proposed a new model to extract the Arabic email content and compare it using three determinants based on neural language programming (NLP) for the purpose of discovering whether it is a legitimate email or a phishing email. The first is a black list of Arabic common phishing words, the roots of a black list of Arabic common phishing words, and a list of Arabic common phishing sentences, the best two results for applying the above conditions were (99% Legal and 96% Phishing) when using the three conditions together and (99% Legal and 94% Phishing) when using a blacklist of common words of phishing, and then will present and discuss the results obtained.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用NLP技术检测和分析网络钓鱼电子邮件
攻击者用来欺骗受害者泄露个人信息的最常见的有害技术是网络钓鱼,他们通常通过电子邮件冒充值得信赖的个人或组织。虽然假电子邮件攻击是网络罪犯常用的一种策略,但随着攻击者从受害者的焦虑中获利,这种攻击最近有所增加。因此,需要进一步研究确定如何识别虚假电子邮件。本文提出了一种新的模型来提取阿拉伯语电子邮件内容,并使用基于神经语言编程(NLP)的三个决定因素对其进行比较,以发现它是合法电子邮件还是网络钓鱼电子邮件。首先是一个阿拉伯语网络钓鱼常用词黑名单,一个阿拉伯语网络钓鱼常用词黑名单的根,一个阿拉伯语网络钓鱼常用词列表,三个条件一起使用时,应用上述两个条件的最佳结果是(99% Legal和96% phishing)和(99% Legal和94% phishing)使用网络钓鱼常用词黑名单,然后将所得到的结果进行展示和讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Classification of Urban Sounds with PSO and WO Based Feature Selection Methods Modeling a system determining the fastest way to get from one point to another by public transport NNA and Activation Equation-Based Prediction of New COVID-19 Infections Plaka tanıma sistemleri ve hibrit bir sistem önerisi Color Image Encryption Using a Sine Variation of the Logistic Map for S-Box and Key Generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1