ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Identifying Under Attack Hateful Email?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)

Publication Date:

Authors : ;

Page : 406-412

Keywords : filtering; emails; hateful attacks; records;

Source : Downloadexternal Find it from : Google Scholarexternal


unsolicited email is not only a nuisance but can be potentially dangerous. Methods to filter it out work fairly well with conventional unsolicited commercial email or email soliciting personal information but they don’t work as well with under attack hateful email (AHE) that facilitates computer network exploitation. Current detection algorithms work well for spam and phishing because it’s easy to detect mass- generated email sent to millions of addresses nit’s possible to gather emails with similar characteristics and message content to probabilistically identify them. AHE, on the other hand, targets single users or small groups in low volumes. It’s tailored specifically to the goal recipient and engineered to appear legitimate and trustworthy. If we rely on current conventional detection methods, AHE goes undetected.

Last modified: 2013-08-03 00:49:43