Poster: Towards a Model for Analysing Anti-Phishing Authentication Ceremonies
نویسندگان
چکیده
Phishing uses both social engineering and technical means to carry out attacks. Therefore, human factors incorrect human trust decisions play an important role in phishing. Many online authentication techniques place a disproportional burden on human abilities. Assumptions made about human-protocol behaviour are often flawed. In our approach we use the concept of a ceremony to analyse and improve the anti-phishing security of web authentication. A ceremony [4] is an extension of the concept of network protocol that includes user interface, human-to-human communication and transfers of physical objects that carry data. It is one way of extending the reach of current methods for analysing protocols to include humans. A secure ceremony is secure against both normal and social engineering attacks, such as phishing. The complexity of defining a ceremony comes with modelling a human node and the major effort yet to be accomplished in the field of ceremony design and analysis is the modelling of the memory and processing performed by human nodes [4], [1]. In this paper we present our recent and on-going work on researching human communication processing in antiphishing authentication ceremonies. We propose a new Human Factors in Anti-Phishing Authentication Ceremonies (APAC) framework and outline how to apply the framework to model human node behaviour. By applying our model, it will be possible to identify design principles for minimising human node interaction errors in anti-phishing authentication ceremonies.
منابع مشابه
Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies
Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans. It is an extension of the concept of network security protocol and includes user interface and human-protocol interaction. We propose a model with ...
متن کاملPoster: Apate: Anti-Phishing Analysing and Triaging Environment
Elmer Lastdrager Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Enschede, The Netherlands Email: [email protected] Pieter Hartel Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Enschede, The Netherlands Email: [email protected] Marianne Junger School of Management and Governance University of Twente E...
متن کاملPhishing Secrets: History, Effects, Countermeasures
This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...
متن کاملPhishing Secrets: History, Effects, and Countermeasures
This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...
متن کاملPoster: User-Centric Phishing Threat Detection
This paper presents a context-aware phishing threat detection model from users’ behavioral perspectives. The context of users’ information accesses is investigated to explore the users’ browsing behaviors that confront phishing situations. Large-scale experiments show that our approach achieves an accuracy of 0.9973 and an F1 score of 0.9311 for predicting the phishing threats of users’ next ac...
متن کامل