High Precision Detection of Business Email Compromise

被引:0
|
作者
Cidon, Asaf [1 ,2 ]
Gavish, Lior
Bleier, Itay
Korshun, Nadia
Schweighauser, Marco
Tsitkin, Alexey [1 ]
机构
[1] Barracuda Networks, Campbell, CA 95008 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business email compromise (BEC) and employee impersonation have become one of the most costly cyber-security threats, causing over $12 billion in reported losses. Impersonation emails take several forms: for example, some ask for a wire transfer to the attacker's account, while others lead the recipient to following a link, which compromises their credentials. Email security systems are not effective in detecting these attacks, because the attacks do not contain a clearly malicious payload, and are personalized to the recipient. We present BEC-Guard, a detector used at Barracuda Networks that prevents business email compromise attacks in real-time using supervised learning. BEC-Guard has been in production since July 2017, and is part of the Barracuda Sentinel email security product. BEC-Guard detects attacks by relying on statistics about the historical email patterns that can be accessed via cloud email provider APIs. The two main challenges when designing BEC-Guard are the need to label millions of emails to train its classifiers, and to properly train the classifiers when the occurrence of employee impersonation emails is very rare, which can bias the classification. Our key insight is to split the classification problem into two parts, one analyzing the header of the email, and the second applying natural language processing to detect phrases associated with BEC or suspicious links in the email body. BEC-Guard utilizes the public APIs of cloud email providers both to automatically learn the historical communication patterns of each organization, and to quarantine emails in real-time. We evaluated BEC-Guard on a commercial dataset containing more than 4,000 attacks, and show it achieves a precision of 98.2% and a false positive rate of less than one in five million emails.
引用
收藏
页码:1291 / 1307
页数:17
相关论文
共 50 条
  • [1] Detection of Business Email Compromise Attacks with Writing Style Analysis
    Vorobeva, Alisa
    Khisaeva, Guldar
    Zakoldaev, Danil
    Kotenko, Igor
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 248 - 262
  • [2] Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review
    Atlam, Hany F.
    Oluwatimilehin, Olayonu
    ELECTRONICS, 2023, 12 (01)
  • [3] Empirical Analysis of Losses from Business-Email Compromise
    Simpson, Geoffrey
    Moore, Tyler
    2020 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2020,
  • [4] Building a business email compromise research dataset with large language models
    Dube, Rohit
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2025, 21 (01):
  • [5] International police cooperation on cyber threats in Colombia: Business Email Compromise Modality
    Pulido, Luis Evelio Castillo
    Acosta, Juan Felipe Jimenez
    LOGOS CIENCIA & TECNOLOGIA, 2024, 16 (01): : 83 - 107
  • [6] A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum
    Teerakanok, Songpon
    Yasuki, Hiroaki
    Uehara, Tetsutaro
    COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 160 - 167
  • [7] Something Phish-y is Going On Here: A Teaching Case on Business Email Compromise
    Bakarich, Kathleen M.
    Baranek, Devon
    CURRENT ISSUES IN AUDITING, 2020, 14 (01): : A1 - A9
  • [8] BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
    Papathanasiou, Anastasios
    Liontos, George
    Paparis, Georgios
    Liagkou, Vasiliki
    Glavas, Euripides
    SENSORS, 2024, 24 (05)
  • [9] Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the "Black Axe" Confraternity
    Lazarus, Suleman
    DEVIANT BEHAVIOR, 2024,
  • [10] Effective Methods for Email Classification: Is it a Business or Personal Email?
    Sosic, Milena
    Graovac, Jelena
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (03) : 1155 - 1175