DETECTING TARGETED MALICIOUS EMAIL THROUGH SUPERVISED CLASSIFICATION OF PERSISTENT THREAT AND RECIPIENT ORIENTED FEATURES by Rohan
نویسندگان
چکیده
Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent attack campaigns that can span years. This dissertation surveys and categorizes existing email filtering techniques, proposes and implements new methods for detecting targeted malicious email and compares these newly developed techniques to traditional detection methods. Current research and commercial methods for detecting illegitimate email are limited to addressing Internet scale email abuse, such as spam, but not focused on addressing targeted malicious emails. Furthermore, conventional tools such as anti-virus are vulnerability focused examining only the binary code of an email but ignoring all relevant contextual metadata. This study first documents the existence of TME and characterizes it as a form of malicious email attack different than spam, phishing and other conventional illegitimate email. The quantitative research is conducted by analyzing email data from a large Fortune 500 company that has been subjected to these targeted emails. Persistent threat features, such as threat actor locale and weaponization tools, along with recipient oriented features, such as reputation and role, are leveraged with supervised data classification algorithms to demonstrate new techniques for detection of targeted malicious email. The specific tools, techniques, procedures, and infrastructure that a threat actor uses characterize the level and capability of a threat; the recipient’s role and repeated targeting speak to the intent of the threat. Both sets of features are used in a random forest classifier to separate targeted malicious email from non-targeted
منابع مشابه
Identifying Under Attack Hateful Email
unsolicited email is not only a nuisance but can be potentially dangerous. Methods to filter it out work fairly well with conventional unsolicited commercial email or email soliciting personal information but they don’t work as well with under attack hateful email (AHE) that facilitates computer network exploitation. Current detection algorithms work well for spam and phishing because it’s easy...
متن کاملSpam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems that can assign a value of trust to each IP address sending email messages. By analyzing the query patterns of each node utilizing reputation information, reputation systems can calculate a reputation score for each ...
متن کاملThe identity of the generator in the problem of social cost
One of Coase’s central insights is that distinguishing between the generator and recipient of an externality is of limited value because externality problems are reciprocal. We reconsider the relevance of the identity of the generator in a model with non-contractible investment ex ante but frictionless bargaining over the externality ex post. In this framework, a party may distort its investmen...
متن کاملTroubling Consequences of Online Political Rumoring
Fear that the Internet promotes harmful political rumoring is merited but not for reasons originally anticipated. Although the network accelerates and widens rumor circulation, on the whole, it does not increase recipient credulity. E-mail, however, which fosters informal political communication within existing social networks, poses a unique threat to factual political knowledge. A national te...
متن کاملUpdate on Prevention, Detection, and Management of Viral Infections in the Renal Transplant Recipient
Despite progress in preventing and controlling infectious complications of renal transplantation, posttransplantation viral infections remain a significant threat to patients’ health. Optimizing outcomes after renal transplantation depends on effective management of posttransplant infectious complications. This paper discusses manifestations, prevention, diagnosis, and treatment of common viral...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010