Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/290
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShukla S.en_US
dc.contributor.authorMisra M.en_US
dc.contributor.authorVarshney G.en_US
dc.date.accessioned2023-11-30T08:18:15Z-
dc.date.available2023-11-30T08:18:15Z-
dc.date.issued2023-
dc.identifier.isbn978-3031255373-
dc.identifier.issn1867-8211-
dc.identifier.otherEID(2-s2.0-85148043796)-
dc.identifier.urihttps://dx.doi.org/10.1007/978-3-031-25538-0_26-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/290-
dc.description.abstractEmails encounter many types of cyber-attacks and email spoofing is one of the most common and challenging investigation problems. This paper identifies spoofing-based email attacks in an organization by analyzing received and replied emails. The detection works by capturing the email traces via memory forensics. Unlike the traditional approaches of capturing the entire physical memory, we only capture the memory of relevant processes for email header extraction. It significantly reduces the size of the memory dump and makes detection faster. We suggest a novel mechanism called URL extractor, which uses seven novel features from URL to identify the live running email message process by applying ML that traces received emails and captures their header fields for analysis. The authentication header fields of SPF, DKIM, DMARC, and ARC are examined closely to develop a detection algorithm for received emails. Similarly, novel header fields of Reference along with MX record are applied for the detection of replied emails. The MX record is fetched to verify the domain name by sending a forward ns-lookup query to DNS. It also includes an email attack alert mechanism for intimating IT admins of an organization regarding suspected attacks. The results thus obtained show that email detection takes 35 secs (apprx.) to complete with high accuracy and low false positives. © 2023, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.sourceLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICSTen_US
dc.subjectCyber securityen_US
dc.subjectEmail attacksen_US
dc.subjectEmail forensicsen_US
dc.subjectEmail spoofingen_US
dc.subjectMemory forensicsen_US
dc.titleForensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learningen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.