Security monitoring technological approach for spear phishing detection
- Authors
- Lee, H.K.; Jang, H.H.; Han, S.H.; Gim, G.Y.
- Issue Date
- Jan-2019
- Publisher
- Springer Verlag
- Keywords
- Hacking mail; Phishing mail; Security monitoring; Spammail; Spear phishing
- Citation
- Studies in Computational Intelligence, v.790, pp.149 - 163
- Journal Title
- Studies in Computational Intelligence
- Volume
- 790
- Start Page
- 149
- End Page
- 163
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/31186
- DOI
- 10.1007/978-3-319-98367-7_12
- ISSN
- 1860-949X
- Abstract
- Recently, security accidents due to intelligent attacks such as (APT, Advanced Persistent Threat) attacks have been widely occurring in various industries. Spear-phishing using e-mail is mainly used because it is necessary to enter an internal system or a network in order for such a targeted APT attack to be successful. Most organizations build and operate e-mail exclusive use security systems, but since they rely on dynamic analysis of attachments or blacklist-based detection, normal link-style spear phishing attacks in various texts may be bypassed. Therefore, as we cannot say that the existing security control system based on e-mail security solution is effective, this study is going to examine the problem current e-mail security solution and present an improved proposal model based on security control. ? 2019, Springer Nature Switzerland AG.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Business Administration > School of Business Administration > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/31186)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.