Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review

View through CrossRef
The risk of cyberattacks against businesses has risen considerably, with Business Email Compromise (BEC) schemes taking the lead as one of the most common phishing attack methods. The daily evolution of this assault mechanism’s attack methods has shown a very high level of proficiency against organisations. Since the majority of BEC emails lack a payloader, they have become challenging for organisations to identify or detect using typical spam filtering and static feature extraction techniques. Hence, an efficient and effective BEC phishing detection approach is required to provide an effective solution to various organisations to protect against such attacks. This paper provides a systematic review and examination of the state of the art of BEC phishing detection techniques to provide a detailed understanding of the topic to allow researchers to identify the main principles of BEC phishing detection, the common Machine Learning (ML) algorithms used, the features used to detect BEC phishing, and the common datasets used. Based on the selected search strategy, 38 articles (of 950 articles) were chosen for closer examination. Out of these articles, the contributions of the selected articles were discussed and summarised to highlight their contributions as well as their limitations. In addition, the features of BEC phishing used for detection were provided, as well as the ML algorithms and datasets that were used in BEC phishing detection models were discussed. In the end, open issues and future research directions of BEC phishing detection based on ML were discussed.
Title: Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review
Description:
The risk of cyberattacks against businesses has risen considerably, with Business Email Compromise (BEC) schemes taking the lead as one of the most common phishing attack methods.
The daily evolution of this assault mechanism’s attack methods has shown a very high level of proficiency against organisations.
Since the majority of BEC emails lack a payloader, they have become challenging for organisations to identify or detect using typical spam filtering and static feature extraction techniques.
Hence, an efficient and effective BEC phishing detection approach is required to provide an effective solution to various organisations to protect against such attacks.
This paper provides a systematic review and examination of the state of the art of BEC phishing detection techniques to provide a detailed understanding of the topic to allow researchers to identify the main principles of BEC phishing detection, the common Machine Learning (ML) algorithms used, the features used to detect BEC phishing, and the common datasets used.
Based on the selected search strategy, 38 articles (of 950 articles) were chosen for closer examination.
Out of these articles, the contributions of the selected articles were discussed and summarised to highlight their contributions as well as their limitations.
In addition, the features of BEC phishing used for detection were provided, as well as the ML algorithms and datasets that were used in BEC phishing detection models were discussed.
In the end, open issues and future research directions of BEC phishing detection based on ML were discussed.

Related Results

Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Phishing Cyber Security Threats
Phishing Cyber Security Threats
Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. ...
The determinants of consumer behavior towards email advertisement
The determinants of consumer behavior towards email advertisement
PurposeThe aim of this study was to develop a theoretical model of email advertising effectiveness and to investigate differences between permission‐based email and spamming. By ex...
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
Phishing attacks remain one of the most prevalent and damaging cybersecurity threats, targeting users across various communication channels such as email, social media, and SMS. Tr...
Klasifikasi Email Phishing Menggunakan Metode TF-IDF dan Algoritma Random Forest
Klasifikasi Email Phishing Menggunakan Metode TF-IDF dan Algoritma Random Forest
Serangan phishing melalui email semakin meningkat dan menjadi ancaman serius terhadap keamanan siber. Metode deteksi tradisional seperti blacklist dan pencocokan pola terbukti tida...
Deep Learning Based Phishing Websites Detection
Deep Learning Based Phishing Websites Detection
Phishing is a crime that involves the theft of confidential user information. Those targeted by phishing websites include individuals, small businesses, cloud storage providers, an...
Identification of Phishing Urls Using Machine Learning
Identification of Phishing Urls Using Machine Learning
Abstract Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing sit...
The need for education on phishing: a survey comparison of the UK and Qatar
The need for education on phishing: a survey comparison of the UK and Qatar
PurposeThis paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phi...

Back to Top