• Corpus ID: 604901

ANALYZING THE RISK AND FINANCIAL IMPACT OF PHISHING ATTACKS USING A KNOWLEDGE BASED APPROACH

@inproceedings{Chen2009ANALYZINGTR,
  title={ANALYZING THE RISK AND FINANCIAL IMPACT OF PHISHING ATTACKS USING A KNOWLEDGE BASED APPROACH},
  author={Xi Chen and Indranil Bose and Alvin Chung Man Leung and Chenhui Guo},
  year={2009}
}
We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value to the firms. We analyze 1,030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid text and data mining method that predicts the severity of the attack with high accuracy. Our research identifies the important textual and financial variables that impact the severity of the attacks and determine that different antecedents… 
1 Citations

Tables from this paper

Cyber Perspectives: Internet Exploitation and Business Survivability

This article examined the changing nature of cyber-attacks and techniques in the context of an online marketplace and provided a taxonomy of tools and best practices that could create awareness and enhance the survivability of businesses in a highly collaborative yet insecure environment.

References

SHOWING 1-10 OF 26 REFERENCES

A framework for detection and measurement of phishing attacks

It is found that it is often possible to tell whether or not a URL belongs to a phishing attack without requiring any knowledge of the corresponding page data.

Indirect Financial Loss of Phishing to Global Market

It is shown that phishing has a significantly negative impact on firms regardless of their size, and that place of incorporation, type of ownership, industry, and time are significant factors exacerbate the impact.

On the Effectiveness of Techniques to Detect Phishing Sites

Over a period of three weeks, the effectiveness of the blacklists maintained by Google and Microsoft with 10,000 phishing URLs was tested, and the existence of page properties that can be used to identify phishing pages were explored.

Online Frauds in Banks with Phishing

Author analyzed the trends of major activities of the phishing across globe specifically in the banking sector and studied the measures to combat the fishing in online banking.

Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents

The findings demonstrate that new information security risk factor disclosures can mitigate the effect of information security incidents in terms of cumulative abnormal return (CAR).

Data Mining Challenges for Electronic Safety: The Case of Fraudulent Intent Detection in E-Mails

How state-of-theart spam filtering systems fail to capture fraudulent intent hidden in the text of e-mails is illustrated, but it is demonstrated how more robust systems can be engineered using existing data mining tools.

A Behavior-Based Detection Approach to Mass-Mailing Host

A new approach to detecting abnormal host by mining mailing traffic data using the theory of decision trees is put forward, which can suppress and stop distribution of mass-mailing threats on the Internet.

Phishing attacks rising, but dollar losses down

  • G. Goth
  • Computer Science
    IEEE Security & Privacy
  • 2005
New research suggests that phishing attacks, although increasing rapidly, aren't proliferating on a wildfire basis. Instead, they might actually he controlled by a small number of criminal

Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security

  • M. Workman
  • Computer Science
    J. Assoc. Inf. Sci. Technol.
  • 2008
An empirical field study was conducted to see if factors that account for successful marketing campaigns and the reasons why people may or may not fall victim to social engineering attacks are also accounted for.