Jan De Beer
Katholieke Universiteit Leuven
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jan De Beer.
Journal of Computer Security | 2010
André Bergholz; Jan De Beer; Sebastian Glahn; Marie-Francine Moens; Gerhard Paaß; Siehyun Strobel
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial institutions or getting access to private information. Phishing has increased enormously over the last years and is a serious threat to global security and economy. There are a number of possible countermeasures to phishing. These range from communication-oriented approaches like authentication protocols over blacklisting to content-based filtering approaches. We argue that the first two approaches are currently not broadly implemented or exhibit deficits. Therefore content-based phishing filters are necessary and widely used to increase communication security. A number of features are extracted capturing the content and structural properties of the email. Subsequently a statistical classifier is trained using these features on a training set of emails labeled as ham (legitimate), spam or phishing. This classifier may then be applied to an email stream to estimate the classes of new incoming emails. In this paper we describe a number of novel features that are particularly well-suited to identify phishing emails. These include statistical models for the low-dimensional descriptions of email topics, sequential analysis of email text and external links, the detection of embedded logos as well as indicators for hidden salting. Hidden salting is the intentional addition or distortion of content not perceivable by the reader. For empirical evaluation we have obtained a large realistic corpus of emails prelabeled as spam, phishing, and ham (legitimate). In experiments our methods outperform other published approaches for classifying phishing emails. We discuss the implications of these results for the practical application of this approach in the workflow of an email provider. Finally we describe a strategy how the filters may be updated and adapted to new types of phishing.
international acm sigir conference on research and development in information retrieval | 2006
Jan De Beer; Marie-Francine Moens
We present rpref ; our generalization of the bpref evaluation metric for assessing the quality of search engine results, given graded rather than binary user relevance judgments.
IEEE Transactions on Information Forensics and Security | 2010
Marie-Francine Moens; Jan De Beer; Erik Boiy; Juan Carlos Gomez
Hidden salting in digital media involves the intentional addition or distortion of content patterns with the purpose of content filtering. We propose a method to detect portions of a digital text source which are invisible to the end user, when they are rendered on a visual medium (like a computer monitor). The method consists of “tapping” into the rendering process and analyzing the rendering commands to identify portions of the source text (plaintext) which will be invisible for a human reader, using criteria based on text character and background colors, font size, overlapping characters, etc. Moreover, text deemed visible (covertext) is reconstructed from rendering commands and then the character reading order is identified, which could differ from the rendering order. The detection and resolution of hidden salting is evaluated on two e-mail corpora, and the effectiveness of this method in spam filtering task is assessed. We provide a solution to a relevant open problem in content filtering applications, namely the presence of tricks aimed at circumventing automatic filters.
Archive | 2007
Nishant Kumar; Jan De Beer; Jan Vanthienen; Marie-Francine Moens
Search tools or information retrieval tools play an important role in a wide range of information management, decision support and electronic commerce activities e.g., matching people and their products of interest on e-commerce sites, improving understanding of customer interactions, improving understanding of market research data, assisting police in obtaining knowledge from crime related unstructured data ([1]) etc. Information retrieval tools are especially important in global enterprises because of their vast amount of interconnected structured and unstructured data files available in multiple languages. With the increasing volume of information, stored in various formats and multiple languages, global enterprises throughout the world are gaining interests in powerful and reliable automated tools that turn data into useful, concise, accurate, and timely information and knowledge, and improve or assist them in information management and decision support activities. In spite of the importance of search tools in a wide variety of applications, the commercially available search tools are often poorly designed in terms of human computer interaction and also their search capabilities are limited by various factors ([2]). The problem of effective retrieval remains a challenge. These challenges ([3]) fuel academic and corporate endeavor at developing suitable tools for information exploitation. On the corporate front this constitutes a thriving business opportunity. Building and continuously adjusting these tools to fit the different and evolving customer needs requires
recent advances in intrusion detection | 2008
Christina Lioma; Marie-Francine Moens; Juan Carlos Gomez; Jan De Beer; André Bergholz; Gerhard Paass; Patrick Horkan
Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).
international conference on enterprise information systems | 2006
Nishant Kumar; Jan Vanthienen; Jan De Beer; Marie-Francine Moens
Proceedings of the ICAIL 2005 Workshop on Data Mining, Information Extraction and Evidentiary Reasoning for Law Enforcement and Counter-terrorism | 2005
Nishant Kumar; Jan De Beer; Jan Vanthienen; Marie-Francine Moens
Lecture Notes in Computer Science | 2006
Nishant Kumar; Jan De Beer; Jan Vanthienen; Marie-Francine Moens
Lecture Notes in Informatics | 2006
Jan De Beer; Nishant Kumar; Marie-Francine Moens; Jan Vanthienen
business information systems | 2006
Jan De Beer; Nishant Kumar; Marie-Francine Moens; Jan Vanthienen