Poster: Towards a Model for Analysing Anti-Phishing Authentication Ceremonies

نویسندگان

  • Edina Hatunic-Webster
  • Fred Mtenzi
  • Brendan O’Shea
چکیده

Phishing uses both social engineering and technical means to carry out attacks. Therefore, human factors incorrect human trust decisions play an important role in phishing. Many online authentication techniques place a disproportional burden on human abilities. Assumptions made about human-protocol behaviour are often flawed. In our approach we use the concept of a ceremony to analyse and improve the anti-phishing security of web authentication. A ceremony [4] is an extension of the concept of network protocol that includes user interface, human-to-human communication and transfers of physical objects that carry data. It is one way of extending the reach of current methods for analysing protocols to include humans. A secure ceremony is secure against both normal and social engineering attacks, such as phishing. The complexity of defining a ceremony comes with modelling a human node and the major effort yet to be accomplished in the field of ceremony design and analysis is the modelling of the memory and processing performed by human nodes [4], [1]. In this paper we present our recent and on-going work on researching human communication processing in antiphishing authentication ceremonies. We propose a new Human Factors in Anti-Phishing Authentication Ceremonies (APAC) framework and outline how to apply the framework to model human node behaviour. By applying our model, it will be possible to identify design principles for minimising human node interaction errors in anti-phishing authentication ceremonies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies

Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans. It is an extension of the concept of network security protocol and includes user interface and human-protocol interaction. We propose a model with ...

متن کامل

Poster: Apate: Anti-Phishing Analysing and Triaging Environment

Elmer Lastdrager Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Enschede, The Netherlands Email: [email protected] Pieter Hartel Faculty of Electrical Engineering, Mathematics and Computer Science University of Twente Enschede, The Netherlands Email: [email protected] Marianne Junger School of Management and Governance University of Twente E...

متن کامل

Phishing Secrets: History, Effects, Countermeasures

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

متن کامل

Phishing Secrets: History, Effects, and Countermeasures

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

متن کامل

Poster: User-Centric Phishing Threat Detection

This paper presents a context-aware phishing threat detection model from users’ behavioral perspectives. The context of users’ information accesses is investigated to explore the users’ browsing behaviors that confront phishing situations. Large-scale experiments show that our approach achieves an accuracy of 0.9973 and an F1 score of 0.9311 for predicting the phishing threats of users’ next ac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013