An Approach of Phishing E-mail Detection Based on Mail Flow

碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information...

Full description

Bibliographic Details
Main Authors: Hsiang-Yuan Fu, 傅湘源
Other Authors: Kuo-Hui Tsai
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/08851381401926722407
id ndltd-TW-098NTOU5394011
record_format oai_dc
spelling ndltd-TW-098NTOU53940112015-10-13T19:35:32Z http://ndltd.ncl.edu.tw/handle/08851381401926722407 An Approach of Phishing E-mail Detection Based on Mail Flow 基於郵件流偵測網路釣魚電子郵件 Hsiang-Yuan Fu 傅湘源 碩士 海洋大學 資訊工程學系 98 With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information, and then use it to obtain ill-gotten gains or to proceed an undue behavior. Although online trading systems have generally use some kind of encryption technology to prevent data leakage, this is not enough since the oldest social engineering techniques evolve with each passing day. For example, the technique called phishing makes people to automatically provide their personal information and/or property to a cheater. This happens all the time both in the real world and in the Internet world. More importantly, it is impossible to guard against such things. One kind of phishing is to impersonate the system administrator to send an e-mail asking users to provide their accounts and passwords for maintenance purposes. In fact, e-mail service has become a main way of phishing. In this paper, a detection mechanism executed in an e-mail server is proposed. The mechanism compares the features of sample phishing e-mails to effectively filter out phishing e-mails. Since phishing e-mail is a kind of spam, the proposed mechanism can also be applied to spam filtering to improve the filtering accuracy. Kuo-Hui Tsai 蔡國煇 2010 學位論文 ; thesis 81 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information, and then use it to obtain ill-gotten gains or to proceed an undue behavior. Although online trading systems have generally use some kind of encryption technology to prevent data leakage, this is not enough since the oldest social engineering techniques evolve with each passing day. For example, the technique called phishing makes people to automatically provide their personal information and/or property to a cheater. This happens all the time both in the real world and in the Internet world. More importantly, it is impossible to guard against such things. One kind of phishing is to impersonate the system administrator to send an e-mail asking users to provide their accounts and passwords for maintenance purposes. In fact, e-mail service has become a main way of phishing. In this paper, a detection mechanism executed in an e-mail server is proposed. The mechanism compares the features of sample phishing e-mails to effectively filter out phishing e-mails. Since phishing e-mail is a kind of spam, the proposed mechanism can also be applied to spam filtering to improve the filtering accuracy.
author2 Kuo-Hui Tsai
author_facet Kuo-Hui Tsai
Hsiang-Yuan Fu
傅湘源
author Hsiang-Yuan Fu
傅湘源
spellingShingle Hsiang-Yuan Fu
傅湘源
An Approach of Phishing E-mail Detection Based on Mail Flow
author_sort Hsiang-Yuan Fu
title An Approach of Phishing E-mail Detection Based on Mail Flow
title_short An Approach of Phishing E-mail Detection Based on Mail Flow
title_full An Approach of Phishing E-mail Detection Based on Mail Flow
title_fullStr An Approach of Phishing E-mail Detection Based on Mail Flow
title_full_unstemmed An Approach of Phishing E-mail Detection Based on Mail Flow
title_sort approach of phishing e-mail detection based on mail flow
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/08851381401926722407
work_keys_str_mv AT hsiangyuanfu anapproachofphishingemaildetectionbasedonmailflow
AT fùxiāngyuán anapproachofphishingemaildetectionbasedonmailflow
AT hsiangyuanfu jīyúyóujiànliúzhēncèwǎnglùdiàoyúdiànziyóujiàn
AT fùxiāngyuán jīyúyóujiànliúzhēncèwǎnglùdiàoyúdiànziyóujiàn
AT hsiangyuanfu approachofphishingemaildetectionbasedonmailflow
AT fùxiāngyuán approachofphishingemaildetectionbasedonmailflow
_version_ 1718042229852864512