Identifying Under Attack Hateful Email?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)
Publication Date: 2013-07-30
Authors : M. Ramu B. Triveni L. Srinivasa Rao;
Page : 406-412
Keywords : filtering; emails; hateful attacks; records;
unsolicited email is not only a nuisance but can be potentially dangerous. Methods to filter it out work fairly well with conventional unsolicited commercial email or email soliciting personal information but they don’t work as well with under attack hateful email (AHE) that facilitates computer network exploitation. Current detection algorithms work well for spam and phishing because it’s easy to detect mass- generated email sent to millions of addresses nit’s possible to gather emails with similar characteristics and message content to probabilistically identify them. AHE, on the other hand, targets single users or small groups in low volumes. It’s tailored specifically to the goal recipient and engineered to appear legitimate and trustworthy. If we rely on current conventional detection methods, AHE goes undetected.
Other Latest Articles
Last modified: 2013-08-03 00:49:43