A Multi-Pronged Approach to Phishing Email Detection

dc.contributor.advisorVerma, Rakesh M.
dc.contributor.committeeMemberMukherjee, Arjun
dc.contributor.committeeMemberBronk, Chris
dc.creatorRai, Nirmala 1988-
dc.date.accessioned2019-11-12T03:13:26Z
dc.date.available2019-11-12T03:13:26Z
dc.date.createdDecember 2015
dc.date.issued2015-12
dc.date.submittedDecember 2015
dc.date.updated2019-11-12T03:13:26Z
dc.description.abstractPhishing emails are a nuisance and a growing threat for the world causing loss of time, effort and money. In this era of online communication and electronic data exchange, every individual connected to the Internet has to face the danger of phishing attacks. Typically, benign-looking emails are used as the attack vectors, which trick users into revealing sensitive information like login credentials, credit-card details, etc. Since every email contains important information in its header, this thesis describes ways of capturing this information for successful classification of phishing emails. Moreover, the phisher has total control over the email body and subject, but little control over the header after the email leaves the sender's domain, unless the phisher is sophisticated and spends a lot of time crafting the attack, which reduces the payoff or may even backfire or yield mixed results. This thesis is a consolidated account of various systems designed to combat phishing emails from different dimensions. The main area of focus is email header. Techniques like n-gram analysis, machine learning and network port scanning are used to extract useful features from the emails. This thesis shows that the classes of features used in these systems are very effective in distinguishing the phishing emails from the legitimate ones. Using different real datasets from varied domains, it highlights the robustness of the methods presented. Some methods, like the header-domain analysis, obtain high detection rates of 99.9% and low false positive rates of 0.1%. These approaches have the advantage and flexibility that they can be easily combined with other existing methods, in addition to being used in standalone mode.
dc.description.departmentComputer Science, Department of
dc.format.digitalOriginborn digital
dc.format.mimetypeapplication/pdf
dc.identifier.citationPortions of this document appear in: Verma, Rakesh, and Nirmala Rai. "Phish-idetector: Message-id based automatic phishing detection." In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 4, pp. 427-434. IEEE, 2015.
dc.identifier.urihttps://hdl.handle.net/10657/5374
dc.language.isoeng
dc.rightsThe author of this work is the copyright owner. UH Libraries and the Texas Digital Library have their permission to store and provide access to this work. UH Libraries has secured permission to reproduce any and all previously published materials contained in the work. Further transmission, reproduction, or presentation of this work is prohibited except with permission of the author(s).
dc.subjectPhishing
dc.subjectEmail
dc.subjectMessage-ID
dc.subjectHeader-Domains
dc.titleA Multi-Pronged Approach to Phishing Email Detection
dc.type.dcmiText
dc.type.genreThesis
thesis.degree.collegeCollege of Natural Sciences and Mathematics
thesis.degree.departmentComputer Science
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Houston
thesis.degree.levelMasters
thesis.degree.nameMaster of Science

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
RAI-THESIS-2015.pdf
Size:
892.64 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
LICENSE.txt
Size:
1.81 KB
Format:
Plain Text
Description: