An Exploration of the Design Features of Phishing Attacks
@inproceedings{Wang2012AnEO, title={An Exploration of the Design Features of Phishing Attacks}, author={Jingguo Wang and Rui Chen and Hejamadi Raghav Rao}, year={2012} }
Phishing is a growing phenomenon, which has not only caused billions in losses, but also has eroded consumer confidence in online transactions. To develop effective countermeasures, we need to understand how phishing e-mails exploit human vulnerabilities. We develop a framework to explore phishing from the perspective of victims. The framework helps understand different features that are utilized by phishers in designing e-mails and websites. We further explore the design patterns of phishing…Â
Figures and Tables from this paper
16 Citations
Detection of phishing websites using a novel twofold ensemble model
- Computer ScienceJ. Syst. Inf. Technol.
- 2018
An ensemble machine learning model for classifying phishing websites as phishing or legitimate ones is presented and implemented as a user-friendly, interactive decision support system.
Typology of phishing email victims based on their behavioural response
- Computer ScienceAMCIS
- 2013
The findings suggest that victims of phishing emails do not always exhibit the same vulnerability, and it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishingmails.
The Impact of Secure Transport Protocols on Phishing Efficacy
- Computer ScienceCSET @ USENIX Security Symposium
- 2019
This study investigates how the security protocol knowledge gap impacts user behavior by performing a phishing experiment on 266 users that A/B tests the effects of HTTP/HTTPS and SMTP/SMTP+TLS on phishing susceptibility.
The impact of users' characteristics on their ability to detect phishing emails
- Computer Science
- 2014
It is found that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishingmails.
Phishing Attacks Over Time : A Longitudinal Study Emergent Research Forum paper
- Computer Science
- 2015
Results show phishing emails are not more sophisticated over time, and implications for IT security research, and future research directions are discussed.
Who is more susceptible to phishing emails? : a Saudi Arabian study
- Computer Science
- 2012
It is found that users who have less email experience and high levels of submissiveness have increased susceptibility and those who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.
FACTORS INFLUENCING EMPLOYEES’ SUSCEPTIBILITY TO PHISHING EMAILS: THE ROLE OF EMOTIONS
- Business
Phishing is a deception method to gain sensitive information from an intended victim by using e-mails and web pages that appear to be from genuine people and businesses. To develop effective programs…
A Novel Architecture to Mitigate Wireless LAN based Phishing Attack
- Computer Science2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)
- 2019
The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID, frequency and a channel which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly.
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
- PsychologyIEEE Transactions on Professional Communication
- 2012
This study examines how users' attention to “visual triggers” and “phishing deception indicators” influence their decision-making processes and consequently their decisions, and suggests that overall cognitive effort expended in email processing decreases with attention to visual triggers and phishing deceived indicators.
Effect of Frame of Mind on Users' Deception Detection Attitudes and Behaviours
- Computer ScienceCONF-IRM
- 2014
It is proposed that human information needs and the framing of important information such as warnings are significant components of users’ frames of mind that impact their vulnerability to online attacks.
References
SHOWING 1-10 OF 54 REFERENCES
The economy of phishing: A survey of the operations of the phishing market
- Computer ScienceFirst Monday
- 2005
This paper presents the findings from extensive research to uncover phishing networks as well as an analysis of the phishing infrastructure.
Learning to detect phishing emails
- Computer ScienceWWW '07
- 2007
This method is applicable, with slight modification, to detection of phishing websites, or the emails used to direct victims to these sites, and correctly identify over 96% of the phishing emails while only mis-classifying on the order of 0.1%" of the legitimate emails.
Interface Illusions
- Computer ScienceIEEE Secur. Priv.
- 2004
Recent phishing scams not only spoof an institution's Web site but also spoof the browser's address bar and display the correct URL.
Anatomy of a Phishing Email
- Computer ScienceCEAS
- 2004
This paper discusses the tricks employed by email scammers in “phishing” emails, which are emails that spoof a reputable company in an attempt to defraud the recipient of personal information. These…
The Art of Deception: Controlling the Human Element of Security
- Computer Science
- 2001
Kevin Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught.
Phishing Attack Victims Likely Targets for Identity Theft
- Art
- 2005
© 2004 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been…
Cognitive Hacking: A Battle for the Mind
- Computer ScienceComputer
- 2002
The Emulex case illustrates the speed, scale, and subtlety with which networked information can propagate and how quickly severe consequences can occur.
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment
- Political ScienceDecis. Support Syst.
- 2007
Believe it or not: Factors influencing credibility on the Web
- BusinessJ. Assoc. Inf. Sci. Technol.
- 2002
The literature review examines empirical evidence, key reviews, and descriptive material related to credibility in general, and in terms of on-line media, and proposes a model for much-needed future research in this area.