Conference Paper

Spam E-mail Identification Using Blockchain Technology

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Over the past few years, there has been an alarming rise in the cyber attacks which are being carried out by Social Engineering Technique. Email is widely used for communication purposes and thus Spam Email Attacks are found to be the most common social engineering technique used by attackers to intrude into the system and perform malicious operations. Almost 85% of the overall email traffic is found to be spam (122.3 billion spam e-mails transmitted per day), which causes severe damage like, data loss, account compromise, ransomware attack, malware infection into the organization/personal systems. Various Artificial Intelligence-based methods (based on reviewing the content of an email) are created to identify spam emails, still, the count of hacks and loss due to spam emails is increasing on daily basis. On the other hand, blockchain being one of the cutting edges and disruptive technology has gained attention in the past few years. In this literature, authors have proposed a blockchain-based system to counter, prevent and identify spam emails. Authors have integrated the wallet-to-wallet transaction in Ethereum, with an existing email system to identify spam and legitimate email. The proposed framework is not based on verifying the content of an email at mailing servers instead the server verifies or check if or not the Cryptocurrency is paid, and thus the proposed framework is supposed to have small workloads and better performance throughput in terms of sending and receiving emails. The authors were able to create a Proof of Concept of the proposed methodology. All the endpoints created to achieve the same were executed in less than 1.5 sec of Elapse Time Average. The proposed framework will act as a Single Source of truth in identifying the Spam E-Mail.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... On the Pheme1 R/NR dataset, experimental findings demonstrate that refined RoBERTa LM models achieve 88.9% accuracy in separating rumor and non-rumor tweets, outperforming state-of-the-art approaches. Choudhari & Das (2021) suggest a blockchain-based architecture to stop hackers and spammers from sending out spam and phishing emails. The framework links an email address to a wallet account in exchange for an ETH processing charge. ...
Conference Paper
At the first NCCiT Conference, there were over 100 attendees, approximately 55 presenters, and 33 presentations. Of the 33 presentations presented at the NCCiT, those papers/abstracts that were completed by the authors and submitted to the Proceedings are listed here. The NCCiT Conference Proceedings have undergone a double-blind peer reviewed process.
... Choudhari [9] stated that on average about 122.3 billion spam emails were sent daily, and according to [10], FBI reported a loss of 12.5 billion USD to business email customers, the FBI's Internet Client Complaint Center "IC3" [11] stated that the total global loss exceeded 43 billion USD for interval between June 2016 and December 2021, and according to Verizon's 2019 Data Breach Investigations Report (DBIR) [12] which include an investigation of malware concluded that a whopping 94% used email as a delivery method. ...
Preprint
Full-text available
Emails and SMSs are the most popular tools in today communications, and as the increase of emails and SMSs users are increase, the number of spams is also increases. Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk, spam emails and SMSs are causing major resource wastage by unnecessarily flooding the network links. Although most spam mail originate with advertisers looking to push their products, some are much more malicious in their intent like phishing emails that aims to trick victims into giving up sensitive information like website logins or credit card information this type of cybercrime is known as phishing. To countermeasure spams, many researches and efforts are done to build spam detectors that are able to filter out messages and emails as spam or ham. In this research we build a spam detector using BERT pre-trained model that classifies emails and messages by understanding to their context, and we trained our spam detector model using multiple corpuses like SMS collection corpus, Enron corpus, SpamAssassin corpus, Ling-Spam corpus and SMS spam collection corpus, our spam detector performance was 98.62%, 97.83%, 99.13% and 99.28% respectively. Keywords: Spam Detector, BERT, Machine learning, NLP, Transformer, Enron Corpus, SpamAssassin Corpus, SMS Spam Detection Corpus, Ling-Spam Corpus.
... Employing SSL, TLS, and inserting a security layer into the SMTP server prevents this attack [120]. To do so, Chaudhary et al. [121] proposed a cryptocurrency and blockchain-enabled email system that prevents SMTP attacks and controls mail spamming. • SQL injection-In structured query language (SQL) injection, attackers parse SQL commands in the SQL database and gain unauthorized access to several websites [158]. ...
Article
Full-text available
The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions.
Chapter
Phishing continues to be one of the most common and effective forms of cyber security threats and involve deception of users thereby getting them provide unauthorized individuals with personal information. In this chapter an overview of phishing attacks is presented with a special focus on anti-phishing technologies. Phishing is then introduced in terms of what is it and different types of it that are currently existing, and the impact that they bring to the individuals who are targeted. Anti-phishing measures are then considered with reference to their purpose of protecting personal and organizational information against emergent threats. Just as the sophistication of phishing has moved from a plain and simple email scam to a spear phishing, the chapter explores the technology in place to curb the deadly attack. Different techniques such as heuristic scans, machine learning and URL filters are described as well as products that help users to avoid falling to phishing tricks. The possibilities of applying new technologies in anti-phishing protection are also investigated, including the AI and blockchain. We present several case studies and analyses which highlight the state of the art in anti-phishing tools and delineate the current strength of various known anti-phishing measures despite of the dynamically developing threat landscape. Thus, with hope to help the readers become more aware of the threat and the ever-unfolding evolution of Phishing and the development of anti-phishing tools, this chapter presents the understanding of the evolution of phishing to the readers.
Conference Paper
Full-text available
In the modern world, emerging hazards not only attack computers but also steal personal information and financial resources. The most widely used means of interaction lately are emails and text messages, and as the percentage of emails increases, so does the amount of spam and phishing. Spam is any type of unwanted, unauthorized electronic communication that is transmitted in large quantities. Spam emails and instant messages waste a lot of resources by redundantly inundating wireless networks. However, most spam emails are sent by commercials looking to promote their offerings, and few are extremely malicious in nature, such as phishing emails, which attempt to trick those targeted into disclosing confidential data such as website credentials or credit card details. Phishing offers a combination of technological and social engineering techniques to steal data on victims' identities and accounts, it is imperative to curtail the threat and criminal activities associated with it. Spam and Phishing mail have become increasingly prevalent significantly in recent years, necessitating sophisticated countermeasures. Despite developed approaches for detecting this type of email, a comprehensive solution remains needed to combat these threats. Mail detectors will be used to identify spam, phishing, and ham messages. This research focuses on demonstrating the potential of a Large Language model technique (specifically the pre-trained BERT model) to detect phishing and spam emails according to their context. A comparative evaluation and analysis are conducted on these approaches. The performance of the model is measured using various evaluation metrics such as Accuracy, Precision, Recall, and F1-Score.
Article
Purpose Recent technological advancements, often linked to Industry 4.0, require organizations to be more agile and innovative. Blockchain technology (BT) holds immense potential in driving organizations to achieve efficiency and transparency in supply chains. However, there exist some insurmountable challenges associated with the adoption of BT in organizational supply chains (SC). This paper attempts to categorically identify and systematize the most influential challenges in the implementation of BT in SC. Design/methodology/approach This study resorts to an extensive literature review and consultations with experts in the field of supply chain management (SCM), information technology and academia to identify, categorize and prioritize the major challenges using VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) and Combined Compromise Solution method (CoCoSo). Findings The top three classes of challenges revealed in this study are privacy challenges (PC), infrastructure challenges (IC) and transparency challenges (TC). Maintaining a balance between data openness and secrecy and rectification of incorrect/erroneous input are the top two challenges in the PC category, integration of BT with sustainable practices and ensuring legitimacy are the top two challenges in the IC category, and proper and correct information sharing in organizations was the top most challenge in the TC category. Originality/value Future scholars and industry professionals will be guided by the importance of the challenges identified in this study to develop an economical and logical approach for integrating BT to increase the efficiency and outcome of supply chains across several industrial sectors.
Article
Full-text available
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are mainly based on conventional identity management schemes and use centralized architectures. There are known security and privacy limitations with such schemes and architectures, such as the single-point failure or surveillance (e.g., device tracking). Hence, in this paper, we present an architecture for capability-based IoT access control utilizing the blockchain and decentralized identifiers to manage the identity and access control for IoT devices. Then, we propose a protocol to provide a systematic view of system interactions, to improve security. We also implement a proof-of-concept prototype of the proposed approach and evaluate the prototype using a real-world use case. Our evaluation results show that the proposed solution is feasible, secure, and scalable.
Article
Full-text available
Email services nowadays are flooded by spam and phishing attacks. Email service providers build their own email filters to protect the final users from such attacks resulting in an overall better experience. However, the attacks come mainly from the same problem in the email protocols, i.e., the lack of authentication mechanism. In this work, we attempt to minimize some of the most common problems identified in email services such as spam, phishing, spoofing, lack of encryption, repudiation and centralization by implementing a smart contract over the Ethereum protocol. The proposal involves a decentralized system, a smart contract, a file system and two applications used as proof of concept.
Article
Full-text available
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT)lends itself well to novel blockchain applications, as do networks and machine visualization, public key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security,etc.
Article
Full-text available
This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this disruptive technology can revolutionise "business-as-usual" practices. To this end, the theoretical underpinnings of numerous research papers published in high ranked scientific journals during the last decade, along with several reports from grey literature as a means of streamlining our assessment and capturing the continuously expanding blockchain domain, are included in this review. Based on a structured, systematic review and thematic content analysis of the discovered literature, we present a comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management, and we establish key themes, trends and emerging areas for research. We also point to the shortcomings identified in the relevant literature, particularly limitations the blockchain technology presents and how these limitations spawn across different sectors and industries. Building on these findings, we identify various research gaps and future exploratory directions that are anticipated to be of significant value both for academics and practitioners.
Conference Paper
Full-text available
Blockchain has proved itself to be tamper resistant and secure. It is increasingly getting attention from companies changing from centralized to decentralized systems. This paper proposes a system for identity and access management using blockchain technology to support authentication and authorization of entities in a digital system. A prototype demonstrates the application of blockchain in identity and access management using the Hyperledger Fabric framework. It provides a proof of concept based on a use case concerning Electronic Health Records from the healthcare domain where an immutable and auditable history is desired for data concerning patients. Basic authentication and authorization operations are able to execute in 2-3 seconds with an initial size of blockchain of about 3.8 MB covering physicians in Denmark.
Conference Paper
Full-text available
Blockchain, the foundation of Bitcoin, has received extensive attentions recently. Blockchain serves as an immutable ledger which allows transactions take place in a decentralized manner. Blockchain-based applications are springing up, covering numerous fields including financial services, reputation system and Internet of Things (IoT), and so on. However, there are still many challenges of blockchain technology such as scalability and security problems waiting to be overcome. This paper presents a comprehensive overview on blockchain technology. We provide an overview of blockchain architechture firstly and compare some typical consensus algorithms used in different blockchains. Furthermore, technical challenges and recent advances are briefly listed. We also lay out possible future trends for blockchain.
Article
Full-text available
A short, 5 page article written for non-economists in which I explain how and why decentralized virtual currencies (like Bitcoin or Ethereum) may have substantial impacts on global capital markets, monetary policy, and exchange rates. (I also lay out a classification scheme differentiating between Virtual Currency, Digital Currency, and Cryptocurrency; with examples of each).
Article
Blockchain has recently emerged as a research trend, with potential applications in a broad range of industries and context. One particular successful Blockchain technology is smart contract, which is widely used in commercial settings (e.g., high value financial transactions). This, however, has security implications due to the potential to financially benefit from a security incident (e.g., identification and exploitation of a vulnerability in the smart contract or its implementation). Among, Ethereum is the most active and arresting. Hence, in this paper, we systematically review existing research efforts on Ethereum smart contract security, published between 2015 and 2019. Specifically, we focus on how smart contracts can be maliciously exploited and targeted, such as security issues of contract program model, vulnerabilities in the program and safety consideration introduced by program execution environment. We also identify potential research opportunities and future research agenda.