MDMap: Assisting Users in Identifying Phishing Emails

نویسندگان

  • Patrick Dwyer
  • Zhenhai Duan
چکیده

Email-based online phishing is one of the key security threats that greatly deteriorate the trustworthiness of the Internet. Although many spam filters have been developed and deployed, a non-negligible number of phishing emails still sneak into users’ inboxes each day. Phishing emails often contain suspicious information that separate them from the legitimate ones; however, average non-expert email users are not acquainted with the details of the Internet email system so as to identify the suspicious information in phishing emails. In this paper we develop a simple yet effective system named MDMap to assist email users in identifying phishing emails. MDMap reveals suspicious information in phishing emails in an intuitive and sensible manner. In particular, in addition to other features, MDMap provides a geographical map showing the message delivery path of an email, which helps to caution the user if the email has been originated from or traversed a suspicious region. In this paper we present the design and development of MDMap and perform a preliminary experiment to illustrate the usefulness of MDMap using real-world phishing emails.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails

We examined the influence of three social engineering strategies on users’ judgments of how safe it is to click on a link in an email. The three strategies examined were authority, scarcity and social proof, and the emails were either genuine, phishing or spear-phishing. Of the three strategies, the use of authority was the most effective strategy in convincing users that a link in an email was...

متن کامل

Behind Phishing: An Examination of Phisher Modi Operandi

Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine the anatomy of phishing URLs and domains, registration of phishing domains and time to activation, and the machines used to host the phishing sites. Our findings can be used as heuristics in filtering phishing-related ...

متن کامل

Testing PhishGuru in the Real World

In real world testing of PhishGuru, an embedded training system that teaches people how to protect themselves from phishing attacks, we found (a) PhishGuru is effective in training people in the real world; (b) users retained knowledge when trained with PhishGuru in the real world; (c) a large percentage of people who clicked on links in simulated emails proceeded to give some form of personal ...

متن کامل

Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two...

متن کامل

Trends in Phishing Attacks: Suggestions for Future Research

One of the most common and costly forms of deception and fraud online is phishing. Due to the ramifications of successful phishing attacks, security experts and researchers seek to better understand this phenomenon. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as users judge the veracity of phishing e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010