An Approach of Phishing E-mail Detection Based on Mail Flow

碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information...

Full description

Bibliographic Details
Main Authors: Hsiang-Yuan Fu, 傅湘源
Other Authors: Kuo-Hui Tsai
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/08851381401926722407
Description
Summary:碩士 === 海洋大學 === 資訊工程學系 === 98 === With the popularity of e-commerce, more and more people are willing to enjoy the convenience and efficiency brought by internet online transactions. Coming with this is a group of new hackers who determine to try all kinds of techniques to steal personal information, and then use it to obtain ill-gotten gains or to proceed an undue behavior. Although online trading systems have generally use some kind of encryption technology to prevent data leakage, this is not enough since the oldest social engineering techniques evolve with each passing day. For example, the technique called phishing makes people to automatically provide their personal information and/or property to a cheater. This happens all the time both in the real world and in the Internet world. More importantly, it is impossible to guard against such things. One kind of phishing is to impersonate the system administrator to send an e-mail asking users to provide their accounts and passwords for maintenance purposes. In fact, e-mail service has become a main way of phishing. In this paper, a detection mechanism executed in an e-mail server is proposed. The mechanism compares the features of sample phishing e-mails to effectively filter out phishing e-mails. Since phishing e-mail is a kind of spam, the proposed mechanism can also be applied to spam filtering to improve the filtering accuracy.