DeepQuarantine for Suspicious Mail
- URL: http://arxiv.org/abs/2001.04168v1
- Date: Mon, 13 Jan 2020 11:32:58 GMT
- Title: DeepQuarantine for Suspicious Mail
- Authors: Nikita Benkovich, Roman Dedenok and Dmitry Golubev
- Abstract summary: DeepQuarantine (DQ) is a cloud technology to detect and quarantine potential spam messages.
Most of the quarantined mail is spam, which allows clients to use email without delay.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we introduce DeepQuarantine (DQ), a cloud technology to detect
and quarantine potential spam messages. Spam attacks are becoming more diverse
and can potentially be harmful to email users. Despite the high quality and
performance of spam filtering systems, detection of a spam campaign can take
some time. Unfortunately, in this case some unwanted messages get delivered to
users. To solve this problem, we created DQ, which detects potential spam and
keeps it in a special Quarantine folder for a while. The time gained allows us
to double-check the messages to improve the reliability of the anti-spam
solution. Due to high precision of the technology, most of the quarantined mail
is spam, which allows clients to use email without delay. Our solution is based
on applying Convolutional Neural Networks on MIME headers to extract deep
features from large-scale historical data. We evaluated the proposed method on
real-world data and showed that DQ enhances the quality of spam detection.
Related papers
- Exploring Content Concealment in Email [0.48748194765816943]
Modern email filters, one of our few defence mechanisms against malicious emails, are often circumvented by sophisticated attackers.
This study focuses on how attackers exploit HTML and CSS in emails to conceal arbitrary content.
This concealed content remains undetected by the recipient, presenting a serious security risk.
arXiv Detail & Related papers (2024-10-15T01:12:47Z) - Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails [1.6298172960110866]
Spam and phishing remain critical threats in cybersecurity, responsible for nearly 90% of security incidents.
As these attacks grow in sophistication, the need for robust defensive mechanisms intensifies.
The emergence of large language models (LLMs) such as ChatGPT presents new challenges.
This work aims to evaluate the robustness and effectiveness of SpamAssassin against LLM-modified email content.
arXiv Detail & Related papers (2024-08-26T14:25:30Z) - ASETF: A Novel Method for Jailbreak Attack on LLMs through Translate Suffix Embeddings [58.82536530615557]
We propose an Adversarial Suffix Embedding Translation Framework (ASETF) to transform continuous adversarial suffix embeddings into coherent and understandable text.
Our method significantly reduces the computation time of adversarial suffixes and achieves a much better attack success rate to existing techniques.
arXiv Detail & Related papers (2024-02-25T06:46:27Z) - Prompted Contextual Vectors for Spear-Phishing Detection [45.07804966535239]
Spear-phishing attacks present a significant security challenge.
We propose a detection approach based on a novel document vectorization method.
Our method achieves a 91% F1 score in identifying LLM-generated spear-phishing emails.
arXiv Detail & Related papers (2024-02-13T09:12:55Z) - Building an Effective Email Spam Classification Model with spaCy [0.0]
Author has used spaCy natural language processing library and 3 machine learning (ML) algorithms Naive Bayes (NB), Decision Tree C45 and Multilayer Perceptron (MLP) in Python programming language to detect spam emails collected from Gmail service.
arXiv Detail & Related papers (2023-03-15T17:41:11Z) - Spam Detection Using BERT [0.0]
We build a spam detector using BERT pre-trained model that classifies emails and messages by understanding to their context.
Our spam detector performance was 98.62%, 97.83%, 99.13% and 99.28% respectively.
arXiv Detail & Related papers (2022-06-06T09:09:40Z) - Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free [126.15842954405929]
Trojan attacks threaten deep neural networks (DNNs) by poisoning them to behave normally on most samples, yet to produce manipulated results for inputs attached with a trigger.
We propose a novel Trojan network detection regime: first locating a "winning Trojan lottery ticket" which preserves nearly full Trojan information yet only chance-level performance on clean inputs; then recovering the trigger embedded in this already isolated subnetwork.
arXiv Detail & Related papers (2022-05-24T06:33:31Z) - Deep convolutional forest: a dynamic deep ensemble approach for spam
detection in text [219.15486286590016]
This paper introduces a dynamic deep ensemble model for spam detection that adjusts its complexity and extracts features automatically.
As a result, the model achieved high precision, recall, f1-score and accuracy of 98.38%.
arXiv Detail & Related papers (2021-10-10T17:19:37Z) - Holmes: An Efficient and Lightweight Semantic Based Anomalous Email
Detector [1.926698798754349]
We present Holmes, an efficient and lightweight semantic based engine for anomalous email detection.
Based on our observations, we claim that, in an enterprise environment, there is a stable relation between senders and receivers, but suspicious emails are commonly from unusual sources.
We evaluate the performance of Holmes in a real-world enterprise environment, in which it sends and receives around 5,000 emails each day.
arXiv Detail & Related papers (2021-04-16T11:42:10Z) - Robust and Verifiable Information Embedding Attacks to Deep Neural
Networks via Error-Correcting Codes [81.85509264573948]
In the era of deep learning, a user often leverages a third-party machine learning tool to train a deep neural network (DNN) classifier.
In an information embedding attack, an attacker is the provider of a malicious third-party machine learning tool.
In this work, we aim to design information embedding attacks that are verifiable and robust against popular post-processing methods.
arXiv Detail & Related papers (2020-10-26T17:42:42Z) - Robust Spammer Detection by Nash Reinforcement Learning [64.80986064630025]
We develop a minimax game where the spammers and spam detectors compete with each other on their practical goals.
We show that an optimization algorithm can reliably find an equilibrial detector that can robustly prevent spammers with any mixed spamming strategies from attaining their practical goal.
arXiv Detail & Related papers (2020-06-10T21:18:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.