• Corpus ID: 17675468

An Exploration of the Design Features of Phishing Attacks

@inproceedings{Wang2012AnEO,
  title={An Exploration of the Design Features of Phishing Attacks},
  author={Jingguo Wang and Rui Chen and Hejamadi Raghav Rao},
  year={2012}
}
Phishing is a growing phenomenon, which has not only caused billions in losses, but also has eroded consumer confidence in online transactions. To develop effective countermeasures, we need to understand how phishing e-mails exploit human vulnerabilities. We develop a framework to explore phishing from the perspective of victims. The framework helps understand different features that are utilized by phishers in designing e-mails and websites. We further explore the design patterns of phishing… 

Detection of phishing websites using a novel twofold ensemble model

An ensemble machine learning model for classifying phishing websites as phishing or legitimate ones is presented and implemented as a user-friendly, interactive decision support system.

Typology of phishing email victims based on their behavioural response

The findings suggest that victims of phishing emails do not always exhibit the same vulnerability, and it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishingmails.

The Impact of Secure Transport Protocols on Phishing Efficacy

This study investigates how the security protocol knowledge gap impacts user behavior by performing a phishing experiment on 266 users that A/B tests the effects of HTTP/HTTPS and SMTP/SMTP+TLS on phishing susceptibility.

The impact of users' characteristics on their ability to detect phishing emails

It is found that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishingmails.

Phishing Attacks Over Time : A Longitudinal Study Emergent Research Forum paper

Results show phishing emails are not more sophisticated over time, and implications for IT security research, and future research directions are discussed.

Who is more susceptible to phishing emails? : a Saudi Arabian study

It is found that users who have less email experience and high levels of submissiveness have increased susceptibility and those who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.

FACTORS INFLUENCING EMPLOYEES’ SUSCEPTIBILITY TO PHISHING EMAILS: THE ROLE OF EMOTIONS

Phishing is a deception method to gain sensitive information from an intended victim by using e-mails and web pages that appear to be from genuine people and businesses. To develop effective programs

A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

  • N. SinghR. Sridaran
  • Computer Science
    2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)
  • 2019
The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID, frequency and a channel which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly.

Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email

This study examines how users' attention to “visual triggers” and “phishing deception indicators” influence their decision-making processes and consequently their decisions, and suggests that overall cognitive effort expended in email processing decreases with attention to visual triggers and phishing deceived indicators.

Effect of Frame of Mind on Users' Deception Detection Attitudes and Behaviours

It is proposed that human information needs and the framing of important information such as warnings are significant components of users’ frames of mind that impact their vulnerability to online attacks.

References

SHOWING 1-10 OF 54 REFERENCES

The economy of phishing: A survey of the operations of the phishing market

  • C. Abad
  • Computer Science
    First Monday
  • 2005
This paper presents the findings from extensive research to uncover phishing networks as well as an analysis of the phishing infrastructure.

Learning to detect phishing emails

This method is applicable, with slight modification, to detection of phishing websites, or the emails used to direct victims to these sites, and correctly identify over 96% of the phishing emails while only mis-classifying on the order of 0.1%" of the legitimate emails.

Interface Illusions

Recent phishing scams not only spoof an institution's Web site but also spoof the browser's address bar and display the correct URL.

Anatomy of a Phishing Email

This paper discusses the tricks employed by email scammers in “phishing” emails, which are emails that spoof a reputable company in an attempt to defraud the recipient of personal information. These

The Art of Deception: Controlling the Human Element of Security

Kevin Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company's sophisticated technical security investment will not be for naught.

Phishing Attack Victims Likely Targets for Identity Theft

© 2004 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been

Cognitive Hacking: A Battle for the Mind

The Emulex case illustrates the speed, scale, and subtlety with which networked information can propagate and how quickly severe consequences can occur.

Believe it or not: Factors influencing credibility on the Web

The literature review examines empirical evidence, key reviews, and descriptive material related to credibility in general, and in terms of on-line media, and proposes a model for much-needed future research in this area.
...