285 Hits in 5.8 sec

Tutorial and critical analysis of phishing websites methods

Rami M. Mohammad, Fadi Thabtah, Lee McCluskey
2015 Computer Science Review  
Overall, one principle if committed by organizations and customers will guarantee the security of their information; that is: "Organizations and consumers should be aware of phishing and antiphishing methods  ...  consumers depending on social skills and website deceiving methods to trick victims into disclosure of their personal information which is usually used in an illegal transaction".  ...  complicated, and the analysis time increases.  ... 
doi:10.1016/j.cosrev.2015.04.001 fatcat:dcbl7izcufd5rkfq26rvr2dbdm

Evaluation of Field Phishing Study Setup Method

Yunsang Oh, Takashi Obi
2012 International Journal of Information and Network Security (IJINS)  
recommendable experiment design method and ethic guideline for ethical and valid phishing study.  ...  So researchers conducting security usability studies are engaged in deceit-based field studies of users that are conducted without prior consent.  ...  Remove advertising banners from the research website or blog. Participants' Responses Analysis in Previous Phishing Studies 3.3.1. Criticism Jagatic et al.  ... 
doi:10.11591/ijins.v1i4.776 fatcat:2hj2no2ajjdmxhwizdjherg354

Teaching Johnny not to fall for phish

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong
2010 ACM Transactions on Internet Technology  
While a great deal of effort has been devoted to solving the phishing problem by prevention and detection of phishing emails and phishing websites, little research has been done in the area of training  ...  fraudulent emails and websites.  ...  Kelley for Anti-Phishing Phil graphics and Flash development.  ... 
doi:10.1145/1754393.1754396 fatcat:xxdcfo5yfjeonbwtz6lkcfj5l4

Pixastic: Steganography based Anti-Phihsing Browser Plug-in [article]

P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan
2012 arXiv   pre-print
Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour.  ...  Pixastic is tested in an online banking scenario and it is compared with other well-known anti-phishing plug-in methods in practice.  ...  Brief survey of Analyzing E-mails, Website content Analysis and Authentication methods Email is the most primary source of phishing attack.  ... 
arXiv:1206.2445v1 fatcat:amlehuq5cncn3gweiz2esaqskq

Phishing Classification Techniques: A Systematic Literature Review

Rahmad Abdillah, Zarina Shukur, Masnizah Mohd, Mohd Zamri Murah
2022 IEEE Access  
types of phishing.  ...  Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.  ...  ACKNOWLEDGMENT This research was funded by the Malaysia Ministry of Education, Universiti Kebangsaan Malaysia under grants, FRGS/1/2019/ICT01/UKM/01/2 and KKP/2020/UKM/4/3.  ... 
doi:10.1109/access.2022.3166474 fatcat:6iv5c23bffeynby2vg3pgglh24

Game Theory for Cyber Deception: A Tutorial [article]

Quanyan Zhu
2019 arXiv   pre-print
In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception.  ...  The tutorial aims to provide a taxonomy of deception and counter-deception and understand how they can be conceptualized, quantified, and designed or mitigated.  ...  This tutorial aims to present an overview of game-theoretic methods and show their applications in different scenarios.  ... 
arXiv:1903.01442v1 fatcat:prcxrq3eq5hq3arhfboq6uhb7u

Using data type based security alert dialogs to raise online security awareness

Max-Emanuel Maurer, Alexander De Luca, Sylvia Kempe
2011 Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11  
Results show that the concept is very well accepted by the users and that with the plugin, especially non-expert participants were more likely to identify fraudulent (or phishing) websites than using the  ...  We implemented the concept as a Firefox plugin and evaluated it in a row of studies including two lab studies, one focus group and one real world study.  ...  Looking at the results again showed that in most critical cases phishing websites were missed after another phishing website was detected.  ... 
doi:10.1145/2078827.2078830 dblp:conf/soups/MaurerLK11 fatcat:q7zl5w5grrevpn5ma3fu45cv3e

Serious Games for Cyber Security Education [article]

Nalin Asanka Gamagedara Arachchilage
2016 arXiv   pre-print
This book focuses on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks.  ...  The elements of a game design framework for avoiding phishing attacks were used to address the game design issues.  ...  A quantitative data analysis approach was employed to analyse the data collected from the survey. Second, the data collected from the think-aloud method and participants' score of pre and post-tests.  ... 
arXiv:1610.09511v1 fatcat:u23ow7jhrza23pqcbl6dsbdc4y

Phishing Detection: A Literature Survey

Mahmoud Khonji, Youssef Iraqi, Andrew Jones
2013 IEEE Communications Surveys and Tutorials  
A high-level overview of various categories of phishing mitigation techniques is also presented, such as: detection, offensive defense, correction, and prevention, which we belief is critical to present  ...  This paper aims at surveying many of the recently proposed phishing mitigation techniques.  ...  This is due to the fact that phishing websites are mostly short-lived and detection at hour zero is critical. • Low false positives.  ... 
doi:10.1109/surv.2013.032213.00009 fatcat:pkxukjfhbnad5kb52drs2vcqcq

A Session and Dialogue Based Social Engineering Framework

Kangfeng Zheng, Tong Wu, Xiujuan Wang, Bin Wu, Chunhua Wu
2019 IEEE Access  
In this tutorial paper, existing social engineering models and frameworks are summarized and a new social engineering framework is proposed involving the concept of the session and dialogue.  ...  The analyses illustrate the usability of the proposed framework and provide a better understanding of various social engineering attacks.  ...  Then, if the target trusts this phishing email, he will click the URL and enter a phishing website.  ... 
doi:10.1109/access.2019.2919150 fatcat:agqnkncj4vfazfy4rt7zku7ahu

SMS-Phishing on Android Smart Phone

2018 Journal of education and science  
Recently, mobile become the most significant device that used almost daily, and one of the most important service that offered by mobile operators is the SMS that used between mobiles, none of the mobile  ...  This application is working on android environment and also needs a little space of memory and it works without leaves anything that refers to the third-party.  ...  industry at a critical juncture: mobile security must be addressed in 2011 in order to ensure the privacy and safety of users' critical personal and business information and data [1] . 1-Related Works  ... 
doi:10.33899/edusj.2018.159322 fatcat:p7doqqjjkfbtldjryn6orzd5aa

A Survey : Data Mining and Machine Learning Methods for Cyber Security

Ashish Prajapati, Shital Gupta
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Short ML/DM method tutorial details will be given. Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method.  ...  This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods.  ...  Most methods of phishing use some form of technical deception designed to make a link in an email (and spoofed website) appear to belong to a legitimate organization, such as well-known bank.  ... 
doi:10.32628/cseit217212 fatcat:rz6kk2ywprbi3lf7gz7msm2zxa

Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network [article]

Abdullahi Isah
2015 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
The tutorial group studied 17 printed pages of anti-phishing, and the game group played a game with the same materials given to the tutorial group.  ...  They also found that participants who received tutorials are better in the identification of real and fake web site. The social engineering malware website camouflage, mimic the original websites.  ...  The participants attempted 50 questions of different actions and responses.  ... 
doi:10.5278/ fatcat:dqz324xtjbgy3jjyameuc2z3ii

Conference Announcement: Libraries and Information Institutions in the Digital Age (LIDA) 2020

2019 Education for Information  
We welcome papers that address critical and theoretical examination of the theme; present current research and evidence, as well as examination of best practices from the field, and practitioner perspectives  ...  The year 2020 celebrates the 20th year of LIDA and the return of LIDA to Dubrovnik, Croatia.  ...  networks and network analysis -Subcultures and marginalized identities -Innovative approaches to methods, measurement and evaluation: social network analysis, interpretivist methods, altmetrics, data  ... 
doi:10.3233/efi-199006 fatcat:l3p3goifczb2pdhar6hourqlea

Web wallet

Min Wu, Robert C. Miller, Greg Little
2006 Proceedings of the second symposium on Usable privacy and security - SOUPS '06  
In the study, it significantly decreased the spoof rate of typical phishing attacks from 63% to 7%, and it effectively prevented all phishing attacks as long as it was used.  ...  It detects phishing attacks by determining where users intend to submit their information and suggests an alternative safe path to their intended site if the current site does not match it.  ...  Any opinions, findings, conclusions or recommendations expressed herein are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/1143120.1143133 dblp:conf/soups/WuML06 fatcat:ujn6dlhvdvahrhi65p7pbwromm
« Previous Showing results 1 — 15 out of 285 results