首页> 美国卫生研究院文献>other >Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
【2h】

Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

机译:创造性的说服力:网络钓鱼攻击的对抗行为和策略研究

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.
机译:网络钓鱼攻击的成功取决于对人类弱点的有效利用。这项研究探索了网络钓鱼中一个被忽视但至关重要的方面:对抗行为。我们旨在了解对手使用的人类行为和策略,以及这些行为如何确定最终用户对网络钓鱼电子邮件的响应。我们通过涉及两个阶段的新颖实验范式来实现这一目标。在对抗阶段,有105位参与者扮演网络钓鱼对手的角色,他们被诱使产生了多个网络钓鱼电子邮件,这些电子邮件可以逃避检测并说服最终用户做出响应。在最终用户阶段,340名参与者执行了电子邮件管理任务,其中他们对第一阶段参与者生成的网络钓鱼电子邮件以及良性电子邮件进行了分类。参与攻击者角色的参与者自我报告了他们在创建的每封电子邮件中采用的策略,并对个人创造力的测试做出了回应。将研究的两个阶段的数据进行合并和分析,以衡量对抗行为对最终用户对网络钓鱼电子邮件的响应的影响。我们发现,与其他尝试每次尝试不同策略的人相比,在所有尝试中坚持使用特定攻击策略(例如发送通知,使用权威语气或表达共同兴趣)的参与者总体上更为成功。我们还发现,策略很大程度上决定了最终用户是更有可能立即回复电子邮件还是将其删除。个人创造力不是对抗性表现的可靠预测指标,而是预测对手逃避检测能力的指标。总而言之,最初提供的网络钓鱼示例,使用的策略以及参与者对某些策略的坚持导致了说服最终用户响应网络钓鱼电子邮件的更高性能。这些见解可用于通知工具和培训过程,以检测电子邮件中的网络钓鱼策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号