Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review

Author:

Atlam Hany F.ORCID,Oluwatimilehin Olayonu

Abstract

The risk of cyberattacks against businesses has risen considerably, with Business Email Compromise (BEC) schemes taking the lead as one of the most common phishing attack methods. The daily evolution of this assault mechanism’s attack methods has shown a very high level of proficiency against organisations. Since the majority of BEC emails lack a payloader, they have become challenging for organisations to identify or detect using typical spam filtering and static feature extraction techniques. Hence, an efficient and effective BEC phishing detection approach is required to provide an effective solution to various organisations to protect against such attacks. This paper provides a systematic review and examination of the state of the art of BEC phishing detection techniques to provide a detailed understanding of the topic to allow researchers to identify the main principles of BEC phishing detection, the common Machine Learning (ML) algorithms used, the features used to detect BEC phishing, and the common datasets used. Based on the selected search strategy, 38 articles (of 950 articles) were chosen for closer examination. Out of these articles, the contributions of the selected articles were discussed and summarised to highlight their contributions as well as their limitations. In addition, the features of BEC phishing used for detection were provided, as well as the ML algorithms and datasets that were used in BEC phishing detection models were discussed. In the end, open issues and future research directions of BEC phishing detection based on ML were discussed.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference61 articles.

1. Cidon, A., Korshun, N., Schweighauser, M., Tsitkin, A., Gavish, L., and Bleier, I. (2019, January 14–16). High Precision Detection of Business Email Compromise High Precision Detection of Business Email Compromise. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), California, USA. Available online: https://www.usenix.org/system/files/sec19-cidon.pdf.

2. Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud;Cross;J. Financ. Crime,2020

3. A survey of emerging threats in cybersecurity;Nepal;J. Comput. Syst. Sci.,2014

4. Nisha, T.N., Bakari, D., and Shukla, C. (2021, January 4–5). Business E-mail Compromise—Techniques and Countermeasures. Proceedings of the 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.

5. Teerakanok, S., Yasuki, H., and UEHARA, T. (2020, January 11–14). A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum. Proceedings of the 2020 IEEE 20th Innternational Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3