An Approach of Phishing E-mail Detection Based on Mail Flow
碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/08851381401926722407 |
id |
ndltd-TW-098NTOU5394011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NTOU53940112015-10-13T19:35:32Z http://ndltd.ncl.edu.tw/handle/08851381401926722407 An Approach of Phishing E-mail Detection Based on Mail Flow 基於郵件流偵測網路釣魚電子郵件 Hsiang-Yuan Fu 傅湘源 碩士 海洋大學 資訊工程學系 98 With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information, and then use it to obtain ill-gotten gains or to proceed an undue behavior. Although online trading systems have generally use some kind of encryption technology to prevent data leakage, this is not enough since the oldest social engineering techniques evolve with each passing day. For example, the technique called phishing makes people to automatically provide their personal information and/or property to a cheater. This happens all the time both in the real world and in the Internet world. More importantly, it is impossible to guard against such things. One kind of phishing is to impersonate the system administrator to send an e-mail asking users to provide their accounts and passwords for maintenance purposes. In fact, e-mail service has become a main way of phishing. In this paper, a detection mechanism executed in an e-mail server is proposed. The mechanism compares the features of sample phishing e-mails to effectively filter out phishing e-mails. Since phishing e-mail is a kind of spam, the proposed mechanism can also be applied to spam filtering to improve the filtering accuracy. Kuo-Hui Tsai 蔡國煇 2010 學位論文 ; thesis 81 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information, and then use it to obtain ill-gotten gains or to proceed an undue behavior. Although online trading systems have generally use some kind of encryption technology to prevent data leakage, this is not enough since the oldest social engineering techniques evolve with each passing day. For example, the technique called phishing makes people to automatically provide their personal information and/or property to a cheater. This happens all the time both in the real world and in the Internet world. More importantly, it is impossible to guard against such things. One kind of phishing is to impersonate the system administrator to send an e-mail asking users to provide their accounts and passwords for maintenance purposes. In fact, e-mail service has become a main way of phishing.
In this paper, a detection mechanism executed in an e-mail server is proposed. The mechanism compares the features of sample phishing e-mails to effectively filter out phishing e-mails. Since phishing e-mail is a kind of spam, the proposed mechanism can also be applied to spam filtering to improve the filtering accuracy.
|
author2 |
Kuo-Hui Tsai |
author_facet |
Kuo-Hui Tsai Hsiang-Yuan Fu 傅湘源 |
author |
Hsiang-Yuan Fu 傅湘源 |
spellingShingle |
Hsiang-Yuan Fu 傅湘源 An Approach of Phishing E-mail Detection Based on Mail Flow |
author_sort |
Hsiang-Yuan Fu |
title |
An Approach of Phishing E-mail Detection Based on Mail Flow |
title_short |
An Approach of Phishing E-mail Detection Based on Mail Flow |
title_full |
An Approach of Phishing E-mail Detection Based on Mail Flow |
title_fullStr |
An Approach of Phishing E-mail Detection Based on Mail Flow |
title_full_unstemmed |
An Approach of Phishing E-mail Detection Based on Mail Flow |
title_sort |
approach of phishing e-mail detection based on mail flow |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/08851381401926722407 |
work_keys_str_mv |
AT hsiangyuanfu anapproachofphishingemaildetectionbasedonmailflow AT fùxiāngyuán anapproachofphishingemaildetectionbasedonmailflow AT hsiangyuanfu jīyúyóujiànliúzhēncèwǎnglùdiàoyúdiànziyóujiàn AT fùxiāngyuán jīyúyóujiànliúzhēncèwǎnglùdiàoyúdiànziyóujiàn AT hsiangyuanfu approachofphishingemaildetectionbasedonmailflow AT fùxiāngyuán approachofphishingemaildetectionbasedonmailflow |
_version_ |
1718042229852864512 |