首页 > 最新文献

APWG Symposium on Electronic Crime Research最新文献

英文 中文
A comparison of machine learning techniques for phishing detection 网络钓鱼检测的机器学习技术比较
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299021
Saeed Abu-Nimeh, D. Nappa, Xinlei Wang, S. Nair
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting phishing. The present study compares the predictive accuracy of several machine learning methods including Logistic Regression (LR), Classification and Regression Trees (CART), Bayesian Additive Regression Trees (BART), Support Vector Machines (SVM), Random Forests (RF), and Neural Networks (NNet) for predicting phishing emails. A data set of 2889 phishing and legitimate emails is used in the comparative study. In addition, 43 features are used to train and test the classifiers.
有许多可用于网络钓鱼检测的应用程序。然而,与预测垃圾邮件不同的是,只有很少的研究将机器学习技术用于预测网络钓鱼。本研究比较了几种机器学习方法的预测准确性,包括逻辑回归(LR)、分类与回归树(CART)、贝叶斯加性回归树(BART)、支持向量机(SVM)、随机森林(RF)和神经网络(NNet),用于预测网络钓鱼邮件。以2889封钓鱼邮件和合法邮件为数据集进行对比研究。此外,还使用了43个特征来训练和测试分类器。
{"title":"A comparison of machine learning techniques for phishing detection","authors":"Saeed Abu-Nimeh, D. Nappa, Xinlei Wang, S. Nair","doi":"10.1145/1299015.1299021","DOIUrl":"https://doi.org/10.1145/1299015.1299021","url":null,"abstract":"There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting phishing. The present study compares the predictive accuracy of several machine learning methods including Logistic Regression (LR), Classification and Regression Trees (CART), Bayesian Additive Regression Trees (BART), Support Vector Machines (SVM), Random Forests (RF), and Neural Networks (NNet) for predicting phishing emails. A data set of 2889 phishing and legitimate emails is used in the comparative study. In addition, 43 features are used to train and test the classifiers.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 426
Fishing for phishes: applying capture-recapture methods to estimate phishing populations 钓鱼:应用捕获-再捕获方法来估计钓鱼种群
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299017
R. Weaver, Michael Patrick Collins
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estimation technique originally developed for wildlife conservation, but is applicable in any environment wherein multiple independent parties collect reports of an activity. Generating a meaningful population estimate for phishing activity requires addressing complex relationships between phishers and phishing reports. Phishers clandestinely occupy machines and adding evasive measures into phishing URLs to evade firewalls and other fraud-detection measures. Phishing reports, in the meantime, may be demonstrate a preference towards certain classes of phish. We address these problems by estimating population in terms of netblocks and by clustering phishing attempts together into scams, which are phishes that demonstrate similar behavior on multiple axes. We generate population estimates using data from two different phishing reports over an 80-day period, and show that these reports capture approximately 40% of scams and 80% of CIDR/24 (256 contiguous address) netblocks involved in phishing.
我们通过对两个主要网络钓鱼网站报告的捕获-再捕获分析来估计互联网上网络钓鱼活动的范围。捕获-再捕获分析是一种种群估计技术,最初是为野生动物保护而开发的,但适用于任何环境,其中多个独立方收集活动报告。为网络钓鱼活动生成有意义的人口估计需要解决网络钓鱼者和网络钓鱼报告之间的复杂关系。钓鱼者秘密地占用机器,并在钓鱼url中添加规避措施,以逃避防火墙和其他欺诈检测措施。与此同时,网络钓鱼报告可能显示出对某些类型的网络钓鱼的偏好。我们通过估计网络块的数量和将网络钓鱼尝试聚类到诈骗中来解决这些问题,这些诈骗是在多个轴上表现出相似行为的网络钓鱼。我们使用来自两个不同的网络钓鱼报告的数据在80天内生成人口估计,并表明这些报告捕获了大约40%的诈骗和80%的CIDR/24(256个连续地址)网络块涉及网络钓鱼。
{"title":"Fishing for phishes: applying capture-recapture methods to estimate phishing populations","authors":"R. Weaver, Michael Patrick Collins","doi":"10.1145/1299015.1299017","DOIUrl":"https://doi.org/10.1145/1299015.1299017","url":null,"abstract":"We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estimation technique originally developed for wildlife conservation, but is applicable in any environment wherein multiple independent parties collect reports of an activity.\u0000 Generating a meaningful population estimate for phishing activity requires addressing complex relationships between phishers and phishing reports. Phishers clandestinely occupy machines and adding evasive measures into phishing URLs to evade firewalls and other fraud-detection measures. Phishing reports, in the meantime, may be demonstrate a preference towards certain classes of phish.\u0000 We address these problems by estimating population in terms of netblocks and by clustering phishing attempts together into scams, which are phishes that demonstrate similar behavior on multiple axes. We generate population estimates using data from two different phishing reports over an 80-day period, and show that these reports capture approximately 40% of scams and 80% of CIDR/24 (256 contiguous address) netblocks involved in phishing.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129330868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Behavioral response to phishing risk 对网络钓鱼风险的行为反应
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299019
J. Downs, Mandy B. Holbrook, L. Cranor
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users to reveal predictors of falling for phishing emails, as well as trusting legitimate emails. Previous work suggests that people may be vulnerable to phishing schemes because their awareness of the risks is not linked to perceived vulnerability or to useful strategies in identifying phishing emails. In this survey, we explore what factors are associated with falling for phishing attacks in a role-play exercise. Our data suggest that deeper understanding of the web environment, such as being able to correctly interpret URLs and understanding what a lock signifies, is associated with less vulnerability to phishing attacks. Perceived severity of the consequences does not predict behavior. These results suggest that educational efforts should aim to increase users' intuitive understanding, rather than merely warning them about risks.
旨在打击网络钓鱼攻击的工具必须考虑到人们如何以及为什么会上当,这样才能有效。这项研究报告了一项针对232名计算机用户的试点调查,以揭示上当钓鱼电子邮件以及信任合法电子邮件的预测因素。先前的研究表明,人们可能容易受到网络钓鱼计划的攻击,因为他们对风险的认识与感知到的脆弱性或识别网络钓鱼电子邮件的有用策略没有联系。在这项调查中,我们通过角色扮演练习来探讨与网络钓鱼攻击有关的因素。我们的数据表明,更深入地了解网络环境,例如能够正确解释url和理解锁的含义,与更少容易受到网络钓鱼攻击有关。感知到的后果的严重性并不能预测行为。这些结果表明,教育工作应该旨在提高用户的直观理解,而不仅仅是警告他们风险。
{"title":"Behavioral response to phishing risk","authors":"J. Downs, Mandy B. Holbrook, L. Cranor","doi":"10.1145/1299015.1299019","DOIUrl":"https://doi.org/10.1145/1299015.1299019","url":null,"abstract":"Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users to reveal predictors of falling for phishing emails, as well as trusting legitimate emails. Previous work suggests that people may be vulnerable to phishing schemes because their awareness of the risks is not linked to perceived vulnerability or to useful strategies in identifying phishing emails. In this survey, we explore what factors are associated with falling for phishing attacks in a role-play exercise. Our data suggest that deeper understanding of the web environment, such as being able to correctly interpret URLs and understanding what a lock signifies, is associated with less vulnerability to phishing attacks. Perceived severity of the consequences does not predict behavior. These results suggest that educational efforts should aim to increase users' intuitive understanding, rather than merely warning them about risks.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
Fighting unicode-obfuscated spam 打击unicode混淆的垃圾邮件
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299020
Changwei Liu, Sid Stamm
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typical spam filters are unable to parse such messages; this is what is used in so-called "rock phishing". To fight image-based spam, many spam filters use heuristic rules in which emails containing images are flagged, and since not many legit emails are composed mainly of a big image, this aids in detecting image-based spam. The spammers are thus interested in circumventing these methods. Unicode transliteration is a convenient tool for spammers, since it allows a spammer to create a large number of homomorphic clones of the same looking message; since Unicode contains many characters that are unique but appear very similar, spammers can translate a message's characters at random to hide black-listed words in an effort to bypass filters. In order to defend against these unicode-obfuscated spam emails, we developed a prototype tool that can be used with Spam Assassin to block spam obfuscated in this way by mapping polymorphic messages to a common, more homogeneous representation. This representation can then be filtered using traditional methods. We demonstrate the ease with which Unicode polymorphism can be used to circumvent spam filters such as SpamAssassin, and then describe a de-obfuscation technique that can be used to catch messages that have been obfuscated in this fashion.
在过去的几年中,垃圾邮件发送者越来越多地使用混淆来使垃圾邮件绕过过滤器。标准的方法是使用看起来像文本的图像,因为典型的垃圾邮件过滤器无法解析这样的消息;这就是所谓的“岩石网络钓鱼”。为了打击基于图像的垃圾邮件,许多垃圾邮件过滤器使用启发式规则,其中包含图像的电子邮件被标记,并且由于没有多少合法电子邮件主要由大图组成,这有助于检测基于图像的垃圾邮件。因此,垃圾邮件发送者对绕过这些方法很感兴趣。Unicode音译对于垃圾邮件发送者来说是一个方便的工具,因为它允许垃圾邮件发送者创建大量相同外观的消息的同态克隆;由于Unicode包含许多唯一但看起来非常相似的字符,垃圾邮件发送者可以随机翻译消息的字符,以隐藏黑名单上的单词,以绕过过滤器。为了防御这些unicode混淆的垃圾邮件,我们开发了一个原型工具,可以与spam Assassin一起使用,通过将多态消息映射到通用的、更均匀的表示来阻止以这种方式混淆的垃圾邮件。然后可以使用传统方法对这种表示进行过滤。我们将演示如何轻松地使用Unicode多态性来绕过SpamAssassin等垃圾邮件过滤器,然后描述一种去混淆技术,该技术可用于捕获以这种方式进行了混淆的消息。
{"title":"Fighting unicode-obfuscated spam","authors":"Changwei Liu, Sid Stamm","doi":"10.1145/1299015.1299020","DOIUrl":"https://doi.org/10.1145/1299015.1299020","url":null,"abstract":"In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typical spam filters are unable to parse such messages; this is what is used in so-called \"rock phishing\". To fight image-based spam, many spam filters use heuristic rules in which emails containing images are flagged, and since not many legit emails are composed mainly of a big image, this aids in detecting image-based spam. The spammers are thus interested in circumventing these methods. Unicode transliteration is a convenient tool for spammers, since it allows a spammer to create a large number of homomorphic clones of the same looking message; since Unicode contains many characters that are unique but appear very similar, spammers can translate a message's characters at random to hide black-listed words in an effort to bypass filters. In order to defend against these unicode-obfuscated spam emails, we developed a prototype tool that can be used with Spam Assassin to block spam obfuscated in this way by mapping polymorphic messages to a common, more homogeneous representation. This representation can then be filtered using traditional methods. We demonstrate the ease with which Unicode polymorphism can be used to circumvent spam filters such as SpamAssassin, and then describe a de-obfuscation technique that can be used to catch messages that have been obfuscated in this fashion.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Examining the impact of website take-down on phishing 检查网站关闭对网络钓鱼的影响
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299016
T. Moore, R. Clayton
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraudsters learn the passwords, personal identification numbers (PINs) and other personal details of the users who are fooled into visiting them. We analyse empirical data on phishing website removal times and the number of visitors that the websites attract, and conclude that website removal is part of the answer to phishing, but it is not fast enough to completely mitigate the problem. The removal times have a good fit to a lognormal distribution, but within the general pattern there is ample evidence that some service providers are faster than others at removing sites, and that some brands can get fraudulent sites removed more quickly. We particularly examine a major subset of phishing websites (operated by the 'rock-phish' gang) which accounts for around half of all phishing activity and whose architectural innovations have extended their average lifetime. Finally, we provide a ballpark estimate of the total loss being suffered by the banking sector from the phishing websites we observed.
银行和其他组织处理欺诈性网络钓鱼网站的方式是向托管服务提供商施压,要求他们将这些网站从互联网上删除。在它们被删除之前,欺诈者会了解被骗访问它们的用户的密码、个人识别号码(pin)和其他个人详细信息。我们分析了网络钓鱼网站删除时间和网站吸引的访问者数量的经验数据,得出结论:网站删除是解决网络钓鱼问题的一部分,但速度不够快,无法完全缓解问题。删除时间很好地符合对数正态分布,但在一般模式中,有充分的证据表明,一些服务提供商在删除网站方面比其他服务提供商更快,一些品牌可以更快地删除欺诈性网站。我们特别研究了网络钓鱼网站的一个主要子集(由“岩石网络钓鱼”团伙运营),这些网站约占所有网络钓鱼活动的一半,其架构创新延长了它们的平均寿命。最后,我们对我们观察到的网络钓鱼网站给银行业造成的总损失提供了一个大概的估计。
{"title":"Examining the impact of website take-down on phishing","authors":"T. Moore, R. Clayton","doi":"10.1145/1299015.1299016","DOIUrl":"https://doi.org/10.1145/1299015.1299016","url":null,"abstract":"Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraudsters learn the passwords, personal identification numbers (PINs) and other personal details of the users who are fooled into visiting them. We analyse empirical data on phishing website removal times and the number of visitors that the websites attract, and conclude that website removal is part of the answer to phishing, but it is not fast enough to completely mitigate the problem. The removal times have a good fit to a lognormal distribution, but within the general pattern there is ample evidence that some service providers are faster than others at removing sites, and that some brands can get fraudulent sites removed more quickly. We particularly examine a major subset of phishing websites (operated by the 'rock-phish' gang) which accounts for around half of all phishing activity and whose architectural innovations have extended their average lifetime. Finally, we provide a ballpark estimate of the total loss being suffered by the banking sector from the phishing websites we observed.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134570325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 217
Evaluating a trial deployment of password re-use for phishing prevention 评估防止网络钓鱼的密码重用试验部署
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299018
D. Florêncio, Cormac Herley
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has been entered at an unfamiliar site is simple. Our solution involves a client that reports Password Re-Use (PRU) events at unfamiliar sites, and a server that accumulates these reports and detects an attack. We show that it is simple to then mitigate the damage by communicating the identities of phished accounts to the institution under attack. Thus, we make no attempt to prevent information leakage, but we try to detect and then rescue users from the consequences of bad trust decisions. The scheme requires deployment on a large scale to realize the major benefits: reliable low latency detection of attacks, and mitigation of compromised accounts. We harness scale against the attacker instead of trying to solve the problem at each client. In [13] we sketched the idea, but questions relating to false positives and the scale required for efficacy remained unanswered. We present results from a trial deployment of half a million clients. We explain the scheme in detail, analyze its performance, and examine a number of anticipated attacks.
我们提出了一种利用规模来防止网络钓鱼的方案。我们表明,虽然阻止钓鱼者获取密码非常困难,但检测密码已在不熟悉的站点输入的事实很简单。我们的解决方案包括一个客户端,它报告不熟悉站点上的密码重用(PRU)事件,以及一个服务器,它收集这些报告并检测攻击。我们表明,通过将钓鱼账户的身份传达给受攻击的机构,可以很容易地减轻损害。因此,我们并不试图防止信息泄露,而是试图检测并将用户从错误信任决策的后果中解救出来。该方案需要大规模部署才能实现其主要优势:可靠的低延迟攻击检测,以及缓解受损帐户。我们利用规模来对付攻击者,而不是试图在每个客户端上解决问题。在[13]中,我们概述了这一想法,但有关假阳性和疗效所需量表的问题仍未得到解答。我们展示了50万客户试用部署的结果。我们详细解释了该方案,分析了其性能,并检查了一些预期的攻击。
{"title":"Evaluating a trial deployment of password re-use for phishing prevention","authors":"D. Florêncio, Cormac Herley","doi":"10.1145/1299015.1299018","DOIUrl":"https://doi.org/10.1145/1299015.1299018","url":null,"abstract":"We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has been entered at an unfamiliar site is simple. Our solution involves a client that reports Password Re-Use (PRU) events at unfamiliar sites, and a server that accumulates these reports and detects an attack. We show that it is simple to then mitigate the damage by communicating the identities of phished accounts to the institution under attack. Thus, we make no attempt to prevent information leakage, but we try to detect and then rescue users from the consequences of bad trust decisions.\u0000 The scheme requires deployment on a large scale to realize the major benefits: reliable low latency detection of attacks, and mitigation of compromised accounts. We harness scale against the attacker instead of trying to solve the problem at each client. In [13] we sketched the idea, but questions relating to false positives and the scale required for efficacy remained unanswered. We present results from a trial deployment of half a million clients. We explain the scheme in detail, analyze its performance, and examine a number of anticipated attacks.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer 让用户重视反钓鱼教育:留存和转移评估
Pub Date : 2007-10-04 DOI: 10.1145/1299015.1299022
P. Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, A. Acquisti, L. Cranor, Jason I. Hong
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training methodology using learning science principles in which phishing education is made part of a primary task for users. The goal is to motivate users to pay attention to the training materials. In embedded training, users are sent simulated phishing attacks and trained after they fall for the attacks. Prior studies tested users immediately after training and demonstrated that embedded training improved users' ability to identify phishing emails and websites. In the present study, we tested users to determine how well they retained knowledge gained through embedded training and how well they transferred this knowledge to identify other types of phishing emails. We also compared the effectiveness of the same training materials delivered via embedded training and delivered as regular email messages. In our experiments, we found that: (a) users learn more effectively when the training materials are presented after users fall for the attack (embedded) than when the same training materials are sent by email (non-embedded); (b) users retain and transfer more knowledge after embedded training than after non-embedded training; and (c) users with higher Cognitive Reflection Test (CRT) scores are more likely than users with lower CRT scores to click on the links in the phishing emails from companies with which they have no account.
旨在教导用户不要落入网络钓鱼攻击的教育材料随处可见,但往往被用户忽视。在本文中,我们使用学习科学原理扩展了嵌入式培训方法,其中网络钓鱼教育成为用户的主要任务的一部分。目标是激励用户关注培训材料。在嵌入式培训中,向用户发送模拟的网络钓鱼攻击,并在用户遭受攻击后进行培训。之前的研究在培训后立即对用户进行测试,并证明嵌入式培训提高了用户识别网络钓鱼电子邮件和网站的能力。在本研究中,我们对用户进行了测试,以确定他们在多大程度上保留了通过嵌入式培训获得的知识,以及他们在多大程度上转移了这些知识来识别其他类型的网络钓鱼电子邮件。我们还比较了通过嵌入式培训和通过常规电子邮件传递的相同培训材料的有效性。在我们的实验中,我们发现:(a)与通过电子邮件发送相同的培训材料(非嵌入式)相比,在用户遭受攻击后呈现培训材料(嵌入式)的用户学习效率更高;(b)使用者在接受嵌入式培训后,会比接受非嵌入式培训后保留和转移更多的知识;(c)认知反射测试(CRT)得分较高的用户比得分较低的用户更有可能点击来自他们没有账户的公司的网络钓鱼邮件中的链接。
{"title":"Getting users to pay attention to anti-phishing education: evaluation of retention and transfer","authors":"P. Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, A. Acquisti, L. Cranor, Jason I. Hong","doi":"10.1145/1299015.1299022","DOIUrl":"https://doi.org/10.1145/1299015.1299022","url":null,"abstract":"Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training methodology using learning science principles in which phishing education is made part of a primary task for users. The goal is to motivate users to pay attention to the training materials. In embedded training, users are sent simulated phishing attacks and trained after they fall for the attacks. Prior studies tested users immediately after training and demonstrated that embedded training improved users' ability to identify phishing emails and websites. In the present study, we tested users to determine how well they retained knowledge gained through embedded training and how well they transferred this knowledge to identify other types of phishing emails. We also compared the effectiveness of the same training materials delivered via embedded training and delivered as regular email messages. In our experiments, we found that: (a) users learn more effectively when the training materials are presented after users fall for the attack (embedded) than when the same training materials are sent by email (non-embedded); (b) users retain and transfer more knowledge after embedded training than after non-embedded training; and (c) users with higher Cognitive Reflection Test (CRT) scores are more likely than users with lower CRT scores to click on the links in the phishing emails from companies with which they have no account.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
期刊
APWG Symposium on Electronic Crime Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1