4 research outputs found

    Guidelines for Developers and Recommendations for Users to Mitigate Phishing Attacks:An Interdisciplinary Research Approach

    Get PDF
    Phishing attacks are common these days. If successful, these attacks cause psychological, emotional, and financial damage to the victims. Such damages may have a long-term impact. The overall objective of this Ph.D. research is to contribute to mitigating phishing victimization risks by exploring phishing prevalence, user-related risk factors, and vulnerable target groups and by designing (1) guidelines for social website developers focused on internet user vulnerabilities and (2) recommendations for users to avoid such attacks. The Ph.D. research acknowledges that phishing attacks are technical in nature, while the impact is financial and psychological. Therefore, an interdisciplinary research approach focusing on empirical research methods from social sciences (i.e., focus groups and surveys) and computer science (i.e., data-driven techniques such as machine learning) is adopted for the research. In particular, we aim to use a machine learning model for data analytics and quantitative and qualitative research design for psychological analysis. The research outcome of this Ph.D. work is expected to provide recommendations for internet users and organizations developing social-media-based software systems through more phishing aware development practices.</p

    A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

    Get PDF
    Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed web- sites and scareware to name a few. This paper presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial

    A Demographic Analysis to Determine User Vulnerability among Several Categories of Phishing Attacks.

    Get PDF
    Phishing attacks have been on a meteoric rise in the last number of years, with 2016 seeing a 65% increase. The attacks range from targeting individuals with personalised messages to spam attacks from bot accounts. With the chances of being targeted by a phishing attack increasing, it is important to identify who is most at risk in order to help alleviate this threat. The aim of this study is to examine members from several demographics and their vulnerability to three types of phishing using data collected from a survey (n = 198). The survey tested the participant’s ability to recognise spoofed phishing emails, SMS phishing (Smishing) and content spoofing attacks. The respondents were presented with questions in the form of screenshots using real world phishing examples. Their answers were collected which recorded whether they got each question correct or incorrect. The data collected was analysed using a two sample t-test or one-way Anova depending on the number of categories per demographic. This study addressed demographic vulnerability to different types of phishing and highlighted who is most at risk. The results of the research revealed that gender and income did not play a part in a participant’s vulnerability to phishing when analysing their total scores across each type of phishing. However, age, education and occupation presented statistically significant results to indicate they do
    corecore