Detecting Phishing Emails the Natural Language Way

@inproceedings{Verma2012DetectingPE,
  title={Detecting Phishing Emails the Natural Language Way},
  author={Rakesh M. Verma and Narasimha Shashidhar and Nabil Hossain},
  booktitle={ESORICS},
  year={2012}
}
Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Email is still the most commonly used medium to launch phishing attacks [1]. In this paper, we present a comprehensive natural language based scheme to detect phishing emails using features that are invariant and fundamentally characterize phishing. Our scheme utilizes all the information present in an email, namely, the header, the links and the text in the body. Although it is obvious… CONTINUE READING
Highly Cited
This paper has 42 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 27 extracted citations

ICT Systems Security and Privacy Protection

IFIP AICT
IFIP Advances in Information and Communication Technology • 2016
View 7 Excerpts
Highly Influenced

Detecting Phishing Attacks Using Natural Language Processing and Machine Learning

2018 IEEE 12th International Conference on Semantic Computing (ICSC) • 2018
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 30 references

The online phishing corpus

J. Nazario
http://monkey.org/~jose/wiki/doku.php • 2004
View 7 Excerpts
Highly Influenced

PhishCatch - A Phishing Detection Tool

2009 33rd Annual IEEE International Computer Software and Applications Conference • 2009
View 4 Excerpts
Highly Influenced

Two-Pronged Phish Snagging

2012 Seventh International Conference on Availability, Reliability and Security • 2012
View 2 Excerpts

New filtering approaches for phishing email

Journal of Computer Security • 2010
View 1 Excerpt

An empirical analysis of phishing blacklists

S. Sheng, B. Wardman, +3 authors C. Zhang
Proc. 6th Conf. on Email and Anti-Spam • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…