Phishing Using a Modified Bayesian Technique

  • Authors:
  • Krist Beck;Justin Zhan

  • Affiliations:
  • -;-

  • Venue:
  • SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Dakota State University has a unique computing environment. Every undergraduate student and professor has a school assigned tablet PC. In addition, it is the State of South Dakota’s premier four year technology university. The university also hosts email, website, and website services for the state’s K-12 program in addition to its own. The high use of the mobile computing environment serves as a reason why we chose it for our phishing experiment. For example, recently one staff member was able to be fooled into providing domain login and password information through a phishing email. This caused over 300,000 emails to be sent from that account and the university was therefore blacklisted from Microsoft and its associated affiliates such as Hotmail and MSN. This paper is an attempt to measure the viability of a phishing attack in a mobile computing environment as well as using an adaptation of a popular spam filtering technique to separate phishing emails from spam and phishing emails from legitimate email.