Analysis of the core research for vendor email compromise filtering model using machine learning

Authors

  • Oleh Kozlenko NTUU KPI, Ukraine
  • Dmytro Zibarov National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

DOI:

https://doi.org/10.20535/tacs.2664-29132023.1.284121

Abstract

Vendor email compromise became one of most sophisticated types of social engineering attacks. Strengths of this malicious activity rely on basis of impersonating vendor that company working with. Thus, it is easy for attacker to exploit this trust for doing different type of data exfiltration or ransom. To mitigate risks, that come with these challenges, information security specialist should consider using different types of approaches, including machine learning, to identify anomalies in email, so further damages can be prevented. The purpose of this work lies in the identification of optimal approach for VEC-style attacks detection and optimizing these approaches with least amount of false-positive (FP) parameters. The object of this research is different methods of text processing algorithms, including machine learning methods for detecting VEC emails. The subject of research in this paper mainly considers impact of mentioned text processing algorithms and its relation with efficiency of VEC email classification, identifying most effective approach and, also, how to improve results of such detections. Results of this paper consists of details for VEC-email attacks detection, challenges that comes with different approaches and proposed solution, that lies in using text processing techniques and agent-related approach with main sphere of implication – machine-learning systems, that are used for identifying social-engineering attacks through email. 

Downloads

Published

2023-09-19

Issue

Section

Intelligent Data analysis methods in cybersecurity