The University of Southampton
University of Southampton Institutional Repository

Business email compromise: a comprehensive taxonomy for detection and prevention

Business email compromise: a comprehensive taxonomy for detection and prevention
Business email compromise: a comprehensive taxonomy for detection and prevention
Business Email Compromise (BEC) is a sophisticated and increasingly prevalent form of cyber fraud that targets businesses and individuals to gain financial benefits and access sensitive data. BEC fraud involves various strategies such as impersonation, account compromise, and social engineering, making them challenging to detect and prevent. Despite numerous solutions developed to combat BEC, the threat continues to evolve. In this paper, we present a comprehensive taxonomy of BEC, categorising its various forms, detection techniques, and countermeasures. The proposed taxonomy seeks to deepen the comprehension of BEC fraud and establish a comprehensive framework for advancing research and practical applications, facilitating the development of more effective defence mechanisms against BEC fraud.
Business Email Compromise (BEC), Countermeasures, Cyber fraud, Detection techniques, Taxonomy
49-54
Association for Computing Machinery
Almutairi, Amirah M.
93ab82cb-5649-45b5-b6a7-a1ce15446354
Kang, Boojoong
cfccdccd-f57f-448e-9f3c-1c51134c48dd
Hashimy, Nawfal A.L.
e73b96f2-bf15-40cb-9af5-23c10ea8e319
Almutairi, Amirah M.
93ab82cb-5649-45b5-b6a7-a1ce15446354
Kang, Boojoong
cfccdccd-f57f-448e-9f3c-1c51134c48dd
Hashimy, Nawfal A.L.
e73b96f2-bf15-40cb-9af5-23c10ea8e319

Almutairi, Amirah M., Kang, Boojoong and Hashimy, Nawfal A.L. (2025) Business email compromise: a comprehensive taxonomy for detection and prevention. In ICISS '24: Proceedings of the 2024 7th International Conference on Information Science and Systems. Association for Computing Machinery. pp. 49-54 . (doi:10.1145/3700706.3700714).

Record type: Conference or Workshop Item (Paper)

Abstract

Business Email Compromise (BEC) is a sophisticated and increasingly prevalent form of cyber fraud that targets businesses and individuals to gain financial benefits and access sensitive data. BEC fraud involves various strategies such as impersonation, account compromise, and social engineering, making them challenging to detect and prevent. Despite numerous solutions developed to combat BEC, the threat continues to evolve. In this paper, we present a comprehensive taxonomy of BEC, categorising its various forms, detection techniques, and countermeasures. The proposed taxonomy seeks to deepen the comprehension of BEC fraud and establish a comprehensive framework for advancing research and practical applications, facilitating the development of more effective defence mechanisms against BEC fraud.

Text
3700706.3700714 - Version of Record
Available under License Creative Commons Attribution.
Download (501kB)

More information

Published date: 31 January 2025
Keywords: Business Email Compromise (BEC), Countermeasures, Cyber fraud, Detection techniques, Taxonomy

Identifiers

Local EPrints ID: 499327
URI: http://eprints.soton.ac.uk/id/eprint/499327
PURE UUID: 042175e8-4a4f-462c-b3b0-28d11378c794
ORCID for Amirah M. Almutairi: ORCID iD orcid.org/0000-0002-2194-7936
ORCID for Boojoong Kang: ORCID iD orcid.org/0000-0001-5984-9867
ORCID for Nawfal A.L. Hashimy: ORCID iD orcid.org/0000-0002-1129-5217

Catalogue record

Date deposited: 17 Mar 2025 17:33
Last modified: 18 Mar 2025 03:05

Export record

Altmetrics

Contributors

Author: Amirah M. Almutairi ORCID iD
Author: Boojoong Kang ORCID iD
Author: Nawfal A.L. Hashimy ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

Loading...

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

Back to top

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×