Optimal Personalized Filtering Against Spear-Phishing Attacks

  title={Optimal Personalized Filtering Against Spear-Phishing Attacks},
  author={Aron Laszka and Yevgeniy Vorobeychik and Xenofon D. Koutsoukos},
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to maximize their success probability, attackers have to target the users that constitute the weakest links of the system. The optimal selection of these target users takes into account both the damage that can be caused by a user and the probability of a malicious e-mail being delivered to and opened by a user. Since… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-10 of 19 references

Hackers attack Nuclear Regulatory Commission 3 times in 3 years

  • J. Rogers
  • FOX News, http://www. foxnews.com/tech/2014/08/20…
  • 2014
2 Excerpts

Nuclear regulator hacked 3 times in 3 years

  • S. Rosenblatt
  • CNET, http://www.cnet.com/news/ nuclear…
  • 2014
1 Excerpt

Threats report - August 2014

  • McAfee Labs.
  • http://www.mcafee.com/us/resources/ reports/rp…
  • 2014

UCI Machine Learning Repository

  • K. Bache, M. Lichman
  • http://archive.ics.uci.edu/ml.
  • 2013
1 Excerpt

The state of phishing attacks

  • J. Hong
  • Communications of the ACM 55(1):74–81.
  • 2012
1 Excerpt

White House confirms ‘spearphishing’ intrusion

  • D. McCullagh
  • CNET, http://www.cnet.com/news/ white-house…
  • 2012
1 Excerpt

Stackelberg vs

  • D. Korzhyk, Z. Yin, C. Kiekintveld, V. Conitzer, M. Tambe
  • Nash in security games: An extended investigation…
  • 2011
1 Excerpt

Top federal lab hacked in spear-phishing attack

  • K. Zetter
  • WIRED, http://www.wired.com/2011/04/ oak-ridge…
  • 2011
1 Excerpt

Similar Papers

Loading similar papers…