Identifying Under Attack Hateful Email?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)Publication Date: 2013-07-30
Authors : M. Ramu B. Triveni L. Srinivasa Rao;
Page : 406-412
Keywords : filtering; emails; hateful attacks; records;
Abstract
unsolicited email is not only a nuisance but can be potentially dangerous. Methods to filter it out work fairly well with conventional unsolicited commercial email or email soliciting personal information but they don’t work as well with under attack hateful email (AHE) that facilitates computer network exploitation. Current detection algorithms work well for spam and phishing because it’s easy to detect mass- generated email sent to millions of addresses nit’s possible to gather emails with similar characteristics and message content to probabilistically identify them. AHE, on the other hand, targets single users or small groups in low volumes. It’s tailored specifically to the goal recipient and engineered to appear legitimate and trustworthy. If we rely on current conventional detection methods, AHE goes undetected.
Other Latest Articles
- OCCUPATIONAL STRESS AMONG THE UNIVERSITY ACADEMICIANS OF GHANA
- A STUDY OF THE INTERRELATIONSHIP BETWEEN RETURN GENERATED BY MUTUAL FUND SCHEMES AND THEIR PERCENTAGE SECTOR HOLDINGS
- DIE DESIGNING AND MOLTEN METAL FLOW ANALYSIS FOR PARKING BRAKE PISTON
- MODERN AERODYNAMICS IN WING DESIGN TO ENHANCE FUEL EFFICIENCY BY REDUCING DRAG
- OFFLINE SIGNATURE VERIFICATION AND RECOGNITION
Last modified: 2013-08-03 00:49:43