A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Tracking Phishing Attacks Over Time
2017
Proceedings of the 26th International Conference on World Wide Web - WWW '17
We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. ...
Taking down that group could potentially have a large impact on the phishing attacks observed today. ...
tracking token). ...
doi:10.1145/3038912.3052654
dblp:conf/www/CuiJBCO17
fatcat:5vwxx4fhzvdvdo5n6eyixw5opy
Analyze of Phishing Violence and Alleviation
2019
European Journal of Business Management and Research
In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks. ...
And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail. ...
TYPE OF PHISHING Over the few previous years, attackers in terms of phishing and tracking down the customers have developed several techniques and methods. And these are some examples of phishing: A. ...
doi:10.24018/ejbmr.2019.4.6.170
fatcat:zi7n6pa3cnfj7akue2qpip7pdu
Baiting the hook: factors impacting susceptibility to phishing attacks
2016
Human-Centric Computing and Information Sciences
We considered relationships between demographic characteristics of individuals and their ability to correctly detect a phishing attack, as well as time-related factors. ...
Given that only 25 % of our participants attained a detection score of over 75 %, we conclude that many people are still at a high risk of falling victim to phishing attacks but, that a careful combination ...
Finally, we will attempt to correlate the time users spent on each page with the success of detecting phishing attacks, and potentially even draw conclusions on how much time a user would need to be a ...
doi:10.1186/s13673-016-0065-2
fatcat:xjodkaeu7ngpnbwhbvbckoxryi
Phisheye: Live Monitoring Of Sandboxed Phishing Kits
2016
Zenodo
Our infrastructure allowed us to draw the rst comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last ...
the process { based on data collected over a period of ve months. ...
The attacker tracking module further keeps track of all attackers who connect to the honeypot using a history of attacker IP addresses and their associated user agents, and provides this information as ...
doi:10.5281/zenodo.166929
fatcat:m4fjjhe3obauzgn2rw4lryfx7u
PhishEye
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
Our infrastructure allowed us to draw the first comprehensive picture of a phishing attack, from the time in which the attacker installs and tests the phishing pages on a compromised host, until the last ...
the process -based on data collected over a period of five months. ...
The attacker tracking module further keeps track of all attackers who connect to the honeypot using a history of attacker IP addresses and their associated user agents, and provides this information as ...
doi:10.1145/2976749.2978330
dblp:conf/ccs/HanKB16
fatcat:hxi2ol7r4ng7hnbqesqfroczcq
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks
2007
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
Today's reactive techniques against phishing usually involve methods that simply minimize the damage rather than attempting to actually track down a phisher. ...
By using web bugs and honeytokens on the fake web site forms the phisher presents, one can log accesses to the honeytokens by the phisher when the attacker views the results of the forms. ...
The investigation will be run over a three month period. The amount of data that is collected will depend on the number of phishing attacks that are received during that time frame. ...
doi:10.1109/hicss.2007.435
dblp:conf/hicss/McRaeV07
fatcat:7546cfgg5rhqtmq5cobb577vdi
The economy of phishing: A survey of the operations of the phishing market
2005
First Monday
Phishing attacks are becoming more sophisticated and are on the rise. ...
Phishing has been defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity 1 . ...
During this study, one of our own research bots was attacked on two separate occasions by another botnet comprised of over 4,000 computers and with close ties to phishing chat rooms. ...
doi:10.5210/fm.v10i9.1272
fatcat:mumwakl37vhwdnxecr7uo77kma
A Survey on Phishing Attacks
2014
International Journal of Computer Applications
A secure and efficient technique is required to detect and prevent the attacks over the network transaction. ...
In this paper we make a survey about various attacks and their problems and establish a problem statement for finding the optimum solution for the problem arises. ...
AVOIDANCE OF PHISHING ATTACK Before being trapped into phishing attack we can work on its avoidance. ...
doi:10.5120/15392-4007
fatcat:tfo3yztgkfawtlw2hwf3bf5w4i
Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method
2022
International Journal of Computer Applications
A phishing email attack is a data manipulation activity that is visible in email headers. ...
This research produces an analysis of phishing email attacks against fake login forms. ...
tracking tools and analyzing emails sent over the network using wireshark and networkminer, it is possible to obtain evidence in the form of detailed information on the existence of phishing emails. ...
doi:10.5120/ijca2022921865
fatcat:cpaztz375vbwjj7uqh6hdvpcuu
Phishing in an Academic Community: A Study of User Susceptibility and Behavior
[article]
2018
arXiv
pre-print
Students who identified themselves as understanding the definition of phishing had a higher susceptibility than did their peers who were merely aware of phishing attacks, with both groups having a higher ...
In spring 2018, we delivered phishing attacks to 450 randomly-selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC's undergraduates. ...
The user can hover over the link and see that it goes to the Google homepage after going through tracking software. ...
arXiv:1811.06078v1
fatcat:vkzr6bsbrbbdtitp5773u7e3fy
Phishing in an academic community: A study of user susceptibility and behavior
2019
Cryptologia
Students who identified themselves as understanding the definition of phishing had a higher susceptibility rate than did their peers who were merely aware of phishing attacks, with both groups having a ...
In spring 2018, we delivered phishing attacks to 450 randomly selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC's undergraduates. ...
He has published over 250 technical papers with an h-index of 79 and over 23,250 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National ...
doi:10.1080/01611194.2019.1623343
fatcat:wzstyj3cizdmdh4chozqb7f4si
A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning
[article]
2021
arXiv
pre-print
Phishing has now proven so successful; it is the number one attack vector. ...
In this paper, we propose a novel approach to protect against phishing attacks using binary visualisation and machine learning. ...
However, phishing attacks are mainly performed over short periods of time. In order to avoid the blacklist draw-backs, various heuristics-based solutions have been proposed [14] . ...
arXiv:2108.13333v1
fatcat:6h67xtaysfdpphz3plyz2hfdk4
Examining the impact of website take-down on phishing
2007
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07
We analyse empirical data on actual phishing website removal times and the number of visitors that the websites attract, and conclude that website removal is part of the answer to phishing, but it is not ...
We particularly examine a major subset of phishing websites (operated by the 'rock-phish' gang) which accounts for around half of all phishing activity and whose architectural innovations have extended ...
Figure 5 : 5 User responses to phishing sites over time. Data includes specious responses. ...
doi:10.1145/1299015.1299016
dblp:conf/ecrime/MooreC07
fatcat:fxqvez7tzzgsdjj5xxv4umodue
A Review of Exposure and Avoidance Techniques for Phishing Attack
2014
International Journal of Computer Applications
for exposing and avoiding from the phishing attack also discusses the advantages and limitation of the approaches. ...
A.Sarannia et al. [4] presented how to avoid the phishing scams, how it is attacked and intend a new end-user based on anti-phishing algorithm which we call -Link Guard‖ algorithm. ...
Link-Guard successfully detects 195 out of the 203 phishing attacks. Our experiments also showed that Link-Guard is light weighted and can detect and prevent phishing attacks in real time. M. ...
doi:10.5120/18748-0003
fatcat:l5g2ixg2azd2zcr2vmgv6oxsoi
The Need for Effective Information Security Awareness
2012
Journal of Advances in Information Technology
Another study focuses on evaluating the chances of general users to fall victims to phishing attacks which can be used to steal bank and personal information. ...
A new advanced phishing attack known as Real-Time Phishing targets two-factor authentication systems, such as one-time passwords or tokens. ...
Interestingly, over 200 users fell victims to the phishing experiment after the IT Department's warning email was sent. ...
doi:10.4304/jait.3.3.176-183
fatcat:p2mfsnifszf7xlpmr32c2bbaee
« Previous
Showing results 1 — 15 out of 5,338 results