Explore chapters and articles related to this topic
Adversarial Attacks and Defenses against Deep Learning in Cybersecurity
Published in Neeraj Mohan, Surbhi Gupta, Chuan-Ming Liu, Society 5.0 and the Future of Emerging Computational Technologies, 2022
Huge adversaries and cybercrimes are evolving in the field of social engineering attacks. Spam is a type of junk mail sent to an email address. Spam does not only include unsolicited commercial emails; sometimes, they may be fraudulent messages. These dangerous types of spam may clog the information stored and damage the network as well. The filtering of spam can be done based on the textual information of the emails. Many AI algorithms, like Naïve Bayes (NB), term frequency-inverse document frequency (TF-IDF) and SVM, will boost up the filtration of spam mail and prevent fraudulent messages. By using advanced techniques, like deep neural networks (DNNs) and case-based reasoning fuzzy logic systems, these kinds of crimes are being prevented to some extent (Lansley et al. 2019). As an advanced technique, the suspected emails can be analyzed based upon feature vectors, such as attachments, mail size, IP address as well as the address of the recipient and sender of the email. To have such deep analysis of detecting cybercrime, advanced SVM and DNN methods are used in cybersecurity applications.
Internet Applications
Published in Akshi Kumar, Web Technology, 2018
Electronic mail, or email as its more commonly called, is a method of sending a message from a user at a computer to a recipient on another computer. Email systems are based on a store-and-forward model in which email computer server systems accept, forward, deliver, and store messages on behalf of users, who only need to connect to the email infrastructure, typically an email server, with a network enabled device for the duration of the message submission or retrieval. An email is a message that may contain text, files, images, or other attachments sent through a network to a specified individual or group of individuals. The first email was sent by Ray Tomlinson in 1971.
Requirements and Analysis
Published in Miroslav Popovic, Communication Protocol Engineering, 2018
Both of these highest-level use cases make use of the use cases Use DNS (Domain Name System) and Use TCP (Transmission Control Protocol). The DNS service provides the mapping of the e-mail server domain name into its IP (Internet Protocol) address. The TCP provides reliable data delivery service. Other than that, the use case Send e-mail uses the use case Use SMTP (Simple Mail Transfer Protocol) and the use case Receive e-mail uses the use case Use POP3 (Post Office Protocol, Version 3). Normally, an e-mail client uses SMTP to send an e-mail message to the e-mail server. Similarly, a user uses POP3 to read the e-mail messages from their mailbox.
Phish Me, Phish Me Not
Published in Journal of Computer Information Systems, 2022
Bartlomiej Hanus, Yu Andy Wu, James Parrish
Phishing is an act of sending a forged e-mail (e.g., using a bulk mailer) to an individual or a group of individuals, in which a phisher (i.e., a person who sets up a phishing scam) attempts to lure their victim into disclosing private information, such as credit card numbers, logins, passwords, etc. Typically, the fake e-mail closely imitates a legitimate entity to gain the recipient’s trust.1 More recently, phishing campaigns tend to also include links to malware, in addition to traditional credential harvesting.2 Experts agree that phishing remains an unresolved headache for most organizations.3–6 According to State of the Phish report,7 76% of that study’s participants have experienced phishing attacks, with small organizations – rather than large ones – being the more likely targets of attacks.8
The psychological interaction of spam email features
Published in Ergonomics, 2019
Sarah E. Williams, Dawn M. Sarno, Joanna E. Lewis, Mindy K. Shoss, Mark B. Neider, Corey J. Bohil
The current research focussed on the psychological basis for classifying spam or phishing emails. Spam is commonly defined as unsolicited bulk emails. Phishing is more insidious, often including overt or covert requests for data which can lead to theft. As statistical filters improve, spammers learn techniques to circumvent them, thus leaving some burden on email recipients. Lowd and Meek (2005) assessed the effectiveness of filters against ‘good word’ attacks or spam messages loaded with extra words common to legitimate emails. They show frequent retraining is the only way to keep filters viable. Other researchers have focussed on machine learning in their efforts to support cybersecurity (Hayden 2015; Wu et al. 2005; Youn and McLeod 2007). However, filters – thorough as they may be – will not catch every spam email. Users must have their own understanding of spam in order to combat the issue.
An M/G/1 queue with two types of general heterogeneous service and optional repeated service subject to server’s breakdown and delayed repair
Published in Quality Technology & Quantitative Management, 2018
Gautam Choudhury, Chandi Ram Kalita
Consider a digital communication network system, where mail server transmits the email data from one station to another station. In emailing process, the Mail servers can be broken down into two main categories: outgoing mail servers and incoming mail servers. Outgoing mail servers are known as SMTP, or Simple Mail Transfer Protocol, servers. Incoming mail servers come in two main varieties. POP3, or Post Office Protocol, version 3, servers are best known for storing sent and received messages on PCs’ local hard drives. IMAP, or Internet Message Access Protocol, servers always store copies of messages on servers. After composing a message and hitting send, sender’s email client – whether it’s Outlook Express or Gmail – connects to its domain’s SMTP server. The sender’s email client communicates with the SMTP server, giving it sender’s email address, the recipient’s email address, the message body and any attachments. The SMTP servers process the recipient’s email address – especially its domain and then perform two types of job. In the first type of job it routed the message directly over to the domain’s POP3 or IMAP server, if the domain name is same as the sender’s and in the second type of job the SMTP server send message to the other domain’s server (DNS) if the domain name is different with sender’s. Typically, message processing request arrive at the SMTP server following Poisson stream and message can select any one of the two types of service at the SMTP server (depending upon the choice of the sender, the sender may send message with same or different domain name as recipient’s). The sender can resend the message again due to failure of the previous sending. In practice message processing request may fail due to failure of the SMTP server. After failure of the SMTP server, the server can be repaired. The repair time depends on the degree of failure of the SMTP server. Because the system performance may be heavily affected by SMTP server breakdown, it is well worth to investigate such system from the queueing theory point of view, as well as reliability point of view. In this scenario, the SMTP server, two types of job by SMTP server, message resend correspond to the server, two types of service and repeated service in the queueing terminology.