Smart Email Security Assistant
Downloads
With security incidents and breaches growing each year, email is still used as the major entry point to server malicious content that results in credential theft or malware infections enabling malicious threat actors to mount complex attacks. This paper is intended to document a new approach for detecting suspicious and malicious emails leveraging techniques such as security analytics, natural language processing to discover the intent of the email, as well as artificial neural networks to support more complex rules for classification. This solution can be used in a basic mode to flag which emails are safe and which are not, at the same time it can also be used by security analysts to gain a better understanding of the attack vectors and speed up the investigation process.
Downloads
“2018 Data Breach Investigations Report,” Verizon. [Online]. Available: https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_execsummary_en_xg.pdf
“SMTPS: Securing SMTP and the Differences Between SSL, TLS, and the Ports They Use,” Agari. [Online]. Available: https://www.agari.com/blog/smtps-how-to-secure-smtp-with-ssl-tls-which-port-to-use
“Overview: Securing client-side SMTP traffic,” F5. [Online]. Available: https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-ssl-administration-13-1-0/12.html
M. Kucherawy, E. Zwicky (Eds.), “Domain-based Message Authentication, Reporting, and Conformance (DMARC),” IETF. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc7489
T. Lv, P. Yan, H. Yuan and W. He, “Spam Filter Based on Naive Bayesian Classifier,” J. Phys.: Conf. Ser. 1575 012054. [Online]. Available: https://iopscience.iop.org/article/10.1088/1742-6596/1575/1/012054/pdf
T. Subramaniam, H.A. Jalab, and A.Y. Taqa, “Overview of textual anti-spam filtering techniques,” International Journal of the Physical Sciences, Vol. 5(12), pp. 1869-1882, Oct. 4, 2010. [Online]. Available: https://www.cs.rug.nl/~tanguyen/pubs/article-Subramaniam.pdf
“Yara. The pattern matching swiss knife for malware researchers,” Yara. [Online]. Available: https://virustotal.github.io/yara/