An Initial Study on Personalized Filtering Thresholds in Defending Sequential Spear Phishing Attacks
نویسندگان
چکیده
Different from spam and regular phishing attacks, spear phishing attacks target a small group of people, and the attackers usually make elaborate plans before attacking. There is existing work on classifying spear phishing emails where a threshold value is used to balance misclassified normal emails and misclassified malicious emails. However, most existing systems use a uniform threshold for all users, while in reality users may differ in how susceptible they are to phishing attacks and their access to critical information. Existing work on setting personalized thresholds assumes that the attacker compromises multiple users simultaneously to maximize his expected utility. However, an attacker may be only interested in specific credential information, which could be accessed by a group of users. In this situation, a sequential attack is more reasonable for the attacker to reduce the cost of launching attacks and the likelihood of detection. We propose a Stackelberg game model to calculate the optimal solution for the sequential attack situation and formulate a bilevel optimization problem for the defender. By exploiting the structure of the bilevel problem, we propose a single level formulation called PEDS that is equivalent to the bilevel problem. Experimental results show that PEDS can solved within 60 seconds even when the number of users is 70, and the thresholds computed by PEDS lead to significant higher defender utilities as compared with existing approaches.
منابع مشابه
Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks
Highly targeted spear phishing attacks are increasingly common, and have been implicated in many major security breeches. Email filtering systems are the first line of defense against such attacks. These filters are typically configured with uniform thresholds for deciding whether or not to allow a message to be delivered to a user. However, users have very significant differences in both their...
متن کاملOptimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to maximize their success probability, attackers have to target the users that constitute the weakest links of the system. The optimal selection of these target users takes into account both the damage that can be caused by...
متن کاملMulti-Defender Strategic Filtering Against Spear-Phishing Attacks
Spear-phishing attacks pose a serious threat to sensitive computer systems, since they sidestep technical security mechanisms by exploiting the carelessness of authorized users. A common way to mitigate such attacks is to use e-mail filters which block e-mails with a maliciousness score above a chosen threshold. Optimal choice of such a threshold involves a tradeoff between the risk from delive...
متن کاملA Design for an Anti-spear-phishing System Aycock
Phishing is a widespread and effective computer-mediated social attack. Phishers have proven highly adaptable in terms of exploiting new communications channels – witness ‘vishing’ and ‘SMiShing’ – and are becoming increasingly sophisticated. At the same time, research has shown that current anti-phishing measures are less than adequate. One concern in terms of malicious software is targeted at...
متن کاملAn interdiscplinary study of phishing and spear-phishing attacks
In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...
متن کامل