A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
نویسندگان
چکیده
منابع مشابه
Unpacking Spear Phishing Susceptibility
We report the results of a field experiment where we sent to over 1200 university students an email or a Facebook message with a link to (non-existing) party pictures from a non-existing person, and later asked them about the reasons for their link clicking behavior. We registered a significant difference in clicking rates: 20% of email versus 42.5% of Facebook recipients clicked. The most freq...
متن کاملOptimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks
Highly targeted spear phishing attacks are increasingly common, and have been implicated in many major security breeches. Email filtering systems are the first line of defense against such attacks. These filters are typically configured with uniform thresholds for deciding whether or not to allow a message to be delivered to a user. However, users have very significant differences in both their...
متن کاملAnatomy of a Phishing Email
This paper discusses the tricks employed by email scammers in “phishing” emails, which are emails that spoof a reputable company in an attempt to defraud the recipient of personal information. These tricks are classified according to whether they are employed in the fraudulent emails or used in the fraudulent Web pages accessed by a link provided in the email. All of the examples used within th...
متن کاملAn interdiscplinary study of phishing and spear-phishing attacks
In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...
متن کاملA Design for an Anti-spear-phishing System Aycock
Phishing is a widespread and effective computer-mediated social attack. Phishers have proven highly adaptable in terms of exploiting new communications channels – witness ‘vishing’ and ‘SMiShing’ – and are becoming increasingly sophisticated. At the same time, research has shown that current anti-phishing measures are less than adequate. One concern in terms of malicious software is targeted at...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Scalable Information Systems
سال: 2018
ISSN: 2032-9407
DOI: 10.4108/eai.26-5-2020.166354