In this challenge you will take the role of cybersecurity analyst, and see if you can identify emails that are trying to pass as legitimate when they are in fact malicious. You notice that bad-actor emails try to trick the receiver by mimicking major email domains. For instance, you notice that @gnail, @gmial, etc. are trying to pass as @gmail. You then decide to get a count of all the domains: those that have the lowest count have a higher probability of being fraudulent. You must also check whether those low-count email domains are trying to pose as the major emails domains or not. Your answer should not mark @unique.com as fraudulent. Note: Try not to hard-code any variables in your workflow, but instead use mean or median for instance. Hint: Checking for string similarity might help.
Workflow
20230907 Pikairos JustKNIMEIt Season 2 Challenge 24 Fraudulent Email Address Detection
External resources
Used extensions & nodes
Created with KNIME Analytics Platform version 4.7.4
- Go to item
Palladian for KNIME
This is an unpublished or unknown extension.
palladian.ws
Version 2.8.1
Legal
By using or downloading the workflow, you agree to our terms and conditions.