Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur

Yi Li, Kaiqi Xiong, Xiangyang Li
{"title":"Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur","authors":"Yi Li, Kaiqi Xiong, Xiangyang Li","doi":"10.4108/eai.13-7-2018.162809","DOIUrl":null,"url":null,"abstract":"Emails have been widely used in our daily life. It is important to understand user behaviors regarding email security situation assessments. However, there are very challenging and limited studies on email user behaviors. To study user security-related behaviors, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. Specifically, we conduct two experimental studies, where participants take part in our experiments on site in a lab contained environment and online through Amazon Mechanical Turk that are referred to on-site study and online study, respectively. In the two experimental studies, we design questionnaires for the two studies and use a set of emails including phishing emails from the real world with some necessary modifications for personal information protection. Furthermore, we develop necessary software tools to collect experimental data include participants’ basic background information, time measurement, mouse movement, and their answers to survey questions. Based on the collected data, we investigate what factors, such as intervention, phishing types, and an incentive mechanism, play a key role in user behaviors when phishing attacks occur. The difficulty of such investigation is due to the qualitative analysis of user behaviors and the limited number of data in the on-site study. For these reasons, we develop an approach to quantify user behavior metrics and reduce the number of user attributes by evaluating the significance of each attribute and analyzing the correlation of attributes. Moreover, we propose a machine learning framework, which contains attribute reduction, to find a critical point that classifies the performance of a participant into either ‘good’ or ‘bad’ through 10-fold cross-validation with randomly selected attributes cross-validation models. The proposed machine learning model can be used to predict the performance of a user based on the user profile. Our data analysis shows that intervention and an incentive mechanism play a significant role while phishing type I is more harmful to users compared to the other two types. The findings of this research can be used to help a user identify a phishing attack and prevent the user from being a victim of such an attack. Received on 21 November 2019; accepted on 13 January 2020; published on 29 January 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EAI Endorsed Trans. Security Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/eai.13-7-2018.162809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Emails have been widely used in our daily life. It is important to understand user behaviors regarding email security situation assessments. However, there are very challenging and limited studies on email user behaviors. To study user security-related behaviors, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. Specifically, we conduct two experimental studies, where participants take part in our experiments on site in a lab contained environment and online through Amazon Mechanical Turk that are referred to on-site study and online study, respectively. In the two experimental studies, we design questionnaires for the two studies and use a set of emails including phishing emails from the real world with some necessary modifications for personal information protection. Furthermore, we develop necessary software tools to collect experimental data include participants’ basic background information, time measurement, mouse movement, and their answers to survey questions. Based on the collected data, we investigate what factors, such as intervention, phishing types, and an incentive mechanism, play a key role in user behaviors when phishing attacks occur. The difficulty of such investigation is due to the qualitative analysis of user behaviors and the limited number of data in the on-site study. For these reasons, we develop an approach to quantify user behavior metrics and reduce the number of user attributes by evaluating the significance of each attribute and analyzing the correlation of attributes. Moreover, we propose a machine learning framework, which contains attribute reduction, to find a critical point that classifies the performance of a participant into either ‘good’ or ‘bad’ through 10-fold cross-validation with randomly selected attributes cross-validation models. The proposed machine learning model can be used to predict the performance of a user based on the user profile. Our data analysis shows that intervention and an incentive mechanism play a significant role while phishing type I is more harmful to users compared to the other two types. The findings of this research can be used to help a user identify a phishing attack and prevent the user from being a victim of such an attack. Received on 21 November 2019; accepted on 13 January 2020; published on 29 January 2020
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
应用机器学习技术来理解网络钓鱼攻击发生时的用户行为
电子邮件在我们的日常生活中被广泛使用。了解用户在电子邮件安全状况评估方面的行为是非常重要的。然而,关于电子邮件用户行为的研究非常具有挑战性和局限性。为了研究用户安全相关行为,我们设计并调查了一个电子邮件测试平台,以了解用户在阅读电子邮件时的不同行为,其中一些是网络钓鱼。具体来说,我们进行了两项实验研究,参与者在实验室包含的环境中现场参与我们的实验,并通过Amazon Mechanical Turk在线参与我们的实验,分别称为现场研究和在线研究。在这两项实验研究中,我们为这两项研究设计了问卷,并使用了一组电子邮件,其中包括来自现实世界的网络钓鱼邮件,并对个人信息保护进行了必要的修改。此外,我们开发了必要的软件工具来收集实验数据,包括参与者的基本背景信息、时间测量、鼠标移动以及他们对调查问题的回答。基于收集到的数据,我们研究了当网络钓鱼攻击发生时,干预、网络钓鱼类型和激励机制等因素在用户行为中起关键作用。这种调查的困难在于对用户行为的定性分析和现场研究的数据数量有限。基于这些原因,我们开发了一种量化用户行为指标的方法,并通过评估每个属性的重要性和分析属性之间的相关性来减少用户属性的数量。此外,我们提出了一个包含属性约简的机器学习框架,通过随机选择属性交叉验证模型的10倍交叉验证,找到一个临界点,将参与者的表现分类为“好”或“坏”。提出的机器学习模型可用于基于用户配置文件预测用户的性能。我们的数据分析表明,干预和激励机制发挥了重要作用,而网络钓鱼类型I比其他两种类型对用户的危害更大。这项研究的结果可用于帮助用户识别网络钓鱼攻击,并防止用户成为此类攻击的受害者。2019年11月21日收到;2020年1月13日接受;于2020年1月29日发布
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers Mitigating Vulnerabilities in Closed Source Software Comparing Online Surveys for Cybersecurity: SONA and MTurk Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1