Filters








5,338 Hits in 3.0 sec

Tracking Phishing Attacks Over Time

Qian Cui, Guy-Vincent Jourdan, Gregor V. Bochmann, Russell Couturier, Iosif-Viorel Onut
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database.  ...  Taking down that group could potentially have a large impact on the phishing attacks observed today.  ...  tracking token).  ... 
doi:10.1145/3038912.3052654 dblp:conf/www/CuiJBCO17 fatcat:5vwxx4fhzvdvdo5n6eyixw5opy

Analyze of Phishing Violence and Alleviation

Ramesh Palanisamy, Mohammed Tariq Shaikh, Senthil Jayapal, Darla Thomas
2019 European Journal of Business Management and Research  
In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks.  ...  And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail.  ...  TYPE OF PHISHING Over the few previous years, attackers in terms of phishing and tracking down the customers have developed several techniques and methods. And these are some examples of phishing: A.  ... 
doi:10.24018/ejbmr.2019.4.6.170 fatcat:zi7n6pa3cnfj7akue2qpip7pdu

Baiting the hook: factors impacting susceptibility to phishing attacks

Cristian Iuga, Jason R. C. Nurse, Arnau Erola
2016 Human-Centric Computing and Information Sciences  
We considered relationships between demographic characteristics of individuals and their ability to correctly detect a phishing attack, as well as time-related factors.  ...  Given that only 25 % of our participants attained a detection score of over 75 %, we conclude that many people are still at a high risk of falling victim to phishing attacks but, that a careful combination  ...  Finally, we will attempt to correlate the time users spent on each page with the success of detecting phishing attacks, and potentially even draw conclusions on how much time a user would need to be a  ... 
doi:10.1186/s13673-016-0065-2 fatcat:xjodkaeu7ngpnbwhbvbckoxryi

Phisheye: Live Monitoring Of Sandboxed Phishing Kits

Xiao Han, Nizar Kheir, Davide Balzarotti
2016 Zenodo  
Our infrastructure allowed us to draw the rst comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last  ...  the process { based on data collected over a period of ve months.  ...  The attacker tracking module further keeps track of all attackers who connect to the honeypot using a history of attacker IP addresses and their associated user agents, and provides this information as  ... 
doi:10.5281/zenodo.166929 fatcat:m4fjjhe3obauzgn2rw4lryfx7u

PhishEye

Xiao Han, Nizar Kheir, Davide Balzarotti
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Our infrastructure allowed us to draw the first comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last  ...  the process -based on data collected over a period of five months.  ...  The attacker tracking module further keeps track of all attackers who connect to the honeypot using a history of attacker IP addresses and their associated user agents, and provides this information as  ... 
doi:10.1145/2976749.2978330 dblp:conf/ccs/HanKB16 fatcat:hxi2ol7r4ng7hnbqesqfroczcq

Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks

Craig McRae, Rayford Vaughn
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Today's reactive techniques against phishing usually involve methods that simply minimize the damage rather than attempting to actually track down a phisher.  ...  By using web bugs and honeytokens on the fake web site forms the phisher presents, one can log accesses to the honeytokens by the phisher when the attacker views the results of the forms.  ...  The investigation will be run over a three month period. The amount of data that is collected will depend on the number of phishing attacks that are received during that time frame.  ... 
doi:10.1109/hicss.2007.435 dblp:conf/hicss/McRaeV07 fatcat:7546cfgg5rhqtmq5cobb577vdi

The economy of phishing: A survey of the operations of the phishing market

Christopher Abad
2005 First Monday  
Phishing attacks are becoming more sophisticated and are on the rise.  ...  Phishing has been defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity 1 .  ...  During this study, one of our own research bots was attacked on two separate occasions by another botnet comprised of over 4,000 computers and with close ties to phishing chat rooms.  ... 
doi:10.5210/fm.v10i9.1272 fatcat:mumwakl37vhwdnxecr7uo77kma

A Survey on Phishing Attacks

Krutika RaniSahu, Jigyasu Dubey
2014 International Journal of Computer Applications  
A secure and efficient technique is required to detect and prevent the attacks over the network transaction.  ...  In this paper we make a survey about various attacks and their problems and establish a problem statement for finding the optimum solution for the problem arises.  ...  AVOIDANCE OF PHISHING ATTACK Before being trapped into phishing attack we can work on its avoidance.  ... 
doi:10.5120/15392-4007 fatcat:tfo3yztgkfawtlw2hwf3bf5w4i

Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method

Zakiyatur Rahma, Imam Riadi
2022 International Journal of Computer Applications  
A phishing email attack is a data manipulation activity that is visible in email headers.  ...  This research produces an analysis of phishing email attacks against fake login forms.  ...  tracking tools and analyzing emails sent over the network using wireshark and networkminer, it is possible to obtain evidence in the form of detailed information on the existence of phishing emails.  ... 
doi:10.5120/ijca2022921865 fatcat:cpaztz375vbwjj7uqh6hdvpcuu

Phishing in an Academic Community: A Study of User Susceptibility and Behavior [article]

Alejandra Diaz, Alan T. Sherman, Anupam Joshi
2018 arXiv   pre-print
Students who identified themselves as understanding the definition of phishing had a higher susceptibility than did their peers who were merely aware of phishing attacks, with both groups having a higher  ...  In spring 2018, we delivered phishing attacks to 450 randomly-selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC's undergraduates.  ...  The user can hover over the link and see that it goes to the Google homepage after going through tracking software.  ... 
arXiv:1811.06078v1 fatcat:vkzr6bsbrbbdtitp5773u7e3fy

Phishing in an academic community: A study of user susceptibility and behavior

Alejandra Diaz, Alan T. Sherman, Anupam Joshi
2019 Cryptologia  
Students who identified themselves as understanding the definition of phishing had a higher susceptibility rate than did their peers who were merely aware of phishing attacks, with both groups having a  ...  In spring 2018, we delivered phishing attacks to 450 randomly selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC's undergraduates.  ...  He has published over 250 technical papers with an h-index of 79 and over 23,250 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National  ... 
doi:10.1080/01611194.2019.1623343 fatcat:wzstyj3cizdmdh4chozqb7f4si

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning [article]

Luke Barlow, Gueltoum Bendiaby, Stavros Shiaelesy, Nick Savage
2021 arXiv   pre-print
Phishing has now proven so successful; it is the number one attack vector.  ...  In this paper, we propose a novel approach to protect against phishing attacks using binary visualisation and machine learning.  ...  However, phishing attacks are mainly performed over short periods of time. In order to avoid the blacklist draw-backs, various heuristics-based solutions have been proposed [14] .  ... 
arXiv:2108.13333v1 fatcat:6h67xtaysfdpphz3plyz2hfdk4

Examining the impact of website take-down on phishing

Tyler Moore, Richard Clayton
2007 Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07  
We analyse empirical data on actual phishing website removal times and the number of visitors that the websites attract, and conclude that website removal is part of the answer to phishing, but it is not  ...  We particularly examine a major subset of phishing websites (operated by the 'rock-phish' gang) which accounts for around half of all phishing activity and whose architectural innovations have extended  ...  Figure 5 : 5 User responses to phishing sites over time. Data includes specious responses.  ... 
doi:10.1145/1299015.1299016 dblp:conf/ecrime/MooreC07 fatcat:fxqvez7tzzgsdjj5xxv4umodue

A Review of Exposure and Avoidance Techniques for Phishing Attack

Kanchan Meena, Tushar Kanti
2014 International Journal of Computer Applications  
for exposing and avoiding from the phishing attack also discusses the advantages and limitation of the approaches.  ...  A.Sarannia et al. [4] presented how to avoid the phishing scams, how it is attacked and intend a new end-user based on anti-phishing algorithm which we call -Link Guard‖ algorithm.  ...  Link-Guard successfully detects 195 out of the 203 phishing attacks. Our experiments also showed that Link-Guard is light weighted and can detect and prevent phishing attacks in real time. M.  ... 
doi:10.5120/18748-0003 fatcat:l5g2ixg2azd2zcr2vmgv6oxsoi

The Need for Effective Information Security Awareness

Fadi A. Aloul
2012 Journal of Advances in Information Technology  
Another study focuses on evaluating the chances of general users to fall victims to phishing attacks which can be used to steal bank and personal information.  ...  A new advanced phishing attack known as Real-Time Phishing targets two-factor authentication systems, such as one-time passwords or tokens.  ...  Interestingly, over 200 users fell victims to the phishing experiment after the IT Department's warning email was sent.  ... 
doi:10.4304/jait.3.3.176-183 fatcat:p2mfsnifszf7xlpmr32c2bbaee
« Previous Showing results 1 — 15 out of 5,338 results