• Corpus ID: 604901

ANALYZING THE RISK AND FINANCIAL IMPACT OF PHISHING ATTACKS USING A KNOWLEDGE BASED APPROACH

@inproceedings{Chen2009ANALYZINGTR,
  title={ANALYZING THE RISK AND FINANCIAL IMPACT OF PHISHING ATTACKS USING A KNOWLEDGE BASED APPROACH},
  author={Xi Chen and Indranil Bose and Alvin Chung Man Leung and Chenhui Guo},
  year={2009}
}
We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value to the firms. We analyze 1,030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid text and data mining method that predicts the severity of the attack with high accuracy. Our research identifies the important textual and financial variables that impact the severity of the attacks and determine that different antecedents… 
1 Citations

Tables from this paper

Cyber Perspectives: Internet Exploitation and Business Survivability
TLDR
This article examined the changing nature of cyber-attacks and techniques in the context of an online marketplace and provided a taxonomy of tools and best practices that could create awareness and enhance the survivability of businesses in a highly collaborative yet insecure environment.

References

SHOWING 1-10 OF 30 REFERENCES
A framework for detection and measurement of phishing attacks
TLDR
It is found that it is often possible to tell whether or not a URL belongs to a phishing attack without requiring any knowledge of the corresponding page data.
Indirect Financial Loss of Phishing to Global Market
TLDR
It is shown that phishing has a significantly negative impact on firms regardless of their size, and that place of incorporation, type of ownership, industry, and time are significant factors exacerbate the impact.
On the Effectiveness of Techniques to Detect Phishing Sites
TLDR
Over a period of three weeks, the effectiveness of the blacklists maintained by Google and Microsoft with 10,000 phishing URLs was tested, and the existence of page properties that can be used to identify phishing pages were explored.
Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
TLDR
The findings demonstrate that new information security risk factor disclosures can mitigate the effect of information security incidents in terms of cumulative abnormal return (CAR).
Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails
TLDR
How state-of-theart spam filtering systems fail to capture fraudulent intent hidden in the text of e-mails is illustrated, but it is demonstrated how more robust systems can be engineered using existing data mining tools.
A Behavior-Based Detection Approach to Mass-Mailing Host
TLDR
A new approach to detecting abnormal host by mining mailing traffic data using the theory of decision trees is put forward, which can suppress and stop distribution of mass-mailing threats on the Internet.
Phishing attacks rising, but dollar losses down
  • G. Goth
  • Computer Science
    IEEE Security & Privacy
  • 2005
New research suggests that phishing attacks, although increasing rapidly, aren't proliferating on a wildfire basis. Instead, they might actually he controlled by a small number of criminal
Social phishing
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.
Indirect Financial Los s of Phishing to Global Market, Proceedings of t he Twenty-Ninth International Conference on In formation Systems, Association for Information
  • 2008
...
...