首页 > 最新文献

2021 APWG Symposium on Electronic Crime Research (eCrime)最新文献

英文 中文
Understanding Risk and Risk Perceptions of Cybercrime in Underground Forums 在地下论坛中了解网络犯罪的风险和风险认知
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738790
Maria Bada, Y. Chua
Understanding the reasons and the pathways of people becoming involved in cybercrime has been an important topic for research within different disciplines. Studies have explored the pathways of skilled hackers into deviant behaviour with a focus on online gaming, however little research has been conducted around understanding risk perception of cybercrime. This study investigates both surface and dark web forums, focusing on a variety of topics from hacking to gaming. The aim of this study is to a) investigate the ways cybercrime is perceived among different members of underground forums; b) identify whether there is an emotional construct of cybercrime; and c) identify the level of knowledge around behaviours which are considered as cybercrime and are criminalised. The novelty of this study lies in the methodological approach taken to conduct qualitative and quantitative research on large text datasets. Our findings identified hacking as one of the main deviant behaviours. Our analysis shows a general optimistic bias influencing the perception of risk associated with cybercrime as well as a number of risk avoidance strategies.
了解人们参与网络犯罪的原因和途径一直是不同学科研究的重要课题。有研究以在线游戏为重点,探索了熟练黑客进入异常行为的途径,然而,关于理解网络犯罪风险感知的研究却很少。这项研究调查了表层和暗网论坛,关注从黑客到游戏的各种主题。本研究的目的是a)调查网络犯罪在地下论坛的不同成员之间的感知方式;B)确定是否存在网络犯罪的情感结构;c)确定被认为是网络犯罪并被定罪的行为的知识水平。本研究的新颖之处在于对大型文本数据集进行定性和定量研究的方法方法。我们的研究发现,黑客行为是主要的越轨行为之一。我们的分析表明,普遍的乐观偏见会影响与网络犯罪相关的风险感知以及一些风险规避策略。
{"title":"Understanding Risk and Risk Perceptions of Cybercrime in Underground Forums","authors":"Maria Bada, Y. Chua","doi":"10.1109/eCrime54498.2021.9738790","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738790","url":null,"abstract":"Understanding the reasons and the pathways of people becoming involved in cybercrime has been an important topic for research within different disciplines. Studies have explored the pathways of skilled hackers into deviant behaviour with a focus on online gaming, however little research has been conducted around understanding risk perception of cybercrime. This study investigates both surface and dark web forums, focusing on a variety of topics from hacking to gaming. The aim of this study is to a) investigate the ways cybercrime is perceived among different members of underground forums; b) identify whether there is an emotional construct of cybercrime; and c) identify the level of knowledge around behaviours which are considered as cybercrime and are criminalised. The novelty of this study lies in the methodological approach taken to conduct qualitative and quantitative research on large text datasets. Our findings identified hacking as one of the main deviant behaviours. Our analysis shows a general optimistic bias influencing the perception of risk associated with cybercrime as well as a number of risk avoidance strategies.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collegiate Social Engineering Capture the Flag Competition 大学生社会工程夺旗比赛
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738746
Aunshul Rege, Rachel Bleiman
Social engineering (SE) is an essential, yet often over-looked, field within cybersecurity, particularly in the context of education, training, and awareness. While there are investments in cybersecurity education programs, they tend to have a primarily technical focus, including within classroom curricula and Capture the Flag (CTF) competitions. Because the current technical CTFs do not emphasize the relevance of the human-socio-psychological aspects of cyberattacks and cybersecurity, the researchers organized and hosted a Collegiate SECTF grounded in the social sciences, which offered a timely and unique platform for students to learn about social engineering topics, such as OSINT, phishing, and vishing, in a hands-on, engaging, and ethical manner. This paper details the planning and logistics of the virtual SECTF event which took place October 2020 at Temple University and hosted 6 teams of undergraduate students from across the world. Students’ experiences while participating in this event are described in detail, with insight on teams’ preparations, group formation and dynamics, strategies and adaptations, learning benefits, and thoughts on each individual flag. The success and positive student responses from the inaugural SECTF provide a proof of concept, demonstrating that experiential learning can be used to teach students about SE.
社会工程(SE)是网络安全中的一个重要领域,但经常被忽视,特别是在教育、培训和意识方面。虽然在网络安全教育项目上有投资,但它们往往主要侧重于技术,包括课堂课程和夺旗(CTF)竞赛。由于目前的技术ctf没有强调网络攻击和网络安全的人类社会心理方面的相关性,研究人员组织并主持了一个以社会科学为基础的大学SECTF,为学生提供了一个及时和独特的平台,以实践、参与和道德的方式学习社会工程主题,如OSINT、网络钓鱼和钓鱼。本文详细介绍了2020年10月在天普大学举办的虚拟SECTF活动的规划和后勤工作,并接待了来自世界各地的6支本科生团队。本课程详细介绍了学生参与活动的经验,包括团队的准备、小组的组成和动态、策略和适应、学习的好处,以及对每个旗帜的看法。首届SECTF的成功和积极的学生反应证明了这一概念,表明体验式学习可以用来教授学生关于SE的知识。
{"title":"Collegiate Social Engineering Capture the Flag Competition","authors":"Aunshul Rege, Rachel Bleiman","doi":"10.1109/eCrime54498.2021.9738746","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738746","url":null,"abstract":"Social engineering (SE) is an essential, yet often over-looked, field within cybersecurity, particularly in the context of education, training, and awareness. While there are investments in cybersecurity education programs, they tend to have a primarily technical focus, including within classroom curricula and Capture the Flag (CTF) competitions. Because the current technical CTFs do not emphasize the relevance of the human-socio-psychological aspects of cyberattacks and cybersecurity, the researchers organized and hosted a Collegiate SECTF grounded in the social sciences, which offered a timely and unique platform for students to learn about social engineering topics, such as OSINT, phishing, and vishing, in a hands-on, engaging, and ethical manner. This paper details the planning and logistics of the virtual SECTF event which took place October 2020 at Temple University and hosted 6 teams of undergraduate students from across the world. Students’ experiences while participating in this event are described in detail, with insight on teams’ preparations, group formation and dynamics, strategies and adaptations, learning benefits, and thoughts on each individual flag. The success and positive student responses from the inaugural SECTF provide a proof of concept, demonstrating that experiential learning can be used to teach students about SE.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124996872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Effectiveness of Phishing Reports on Twitter 评估Twitter上网络钓鱼报告的有效性
Pub Date : 2021-11-13 DOI: 10.1109/eCrime54498.2021.9738786
S. Roy, Unique Karanjit, Shirin Nilizadeh
Phishing attacks are an increasingly potent web-based threat, with nearly 1.5 million such websites being created on a monthly basis. In this work, we present the first study towards identifying phishing attacks through reports shared by security conscious users on Twitter. We evaluated over 16.4k such reports posted by 701 Twitter accounts between June to August 2021, which contained 11.1k unique URLs, and analyzed their effectiveness using various quantitative and qualitative measures. Our findings indicate that not only these reports share a high volume of legitimate phishing URLs, but they also contain more information regarding the phishing websites (which can expedite the process of identifying and removing these threats), when compared to two popular open-source phishing feeds: PhishTank and OpenPhish. We also noticed that the URLs in the Twitter reports had very little overlap with the URLs found on PhishTank and OpenPhish, and also remained active for longer periods of time. However, despite having these attributes, we found that these reports have very low interaction from other users on Twitter, especially from the domains and organizations which were targeted by the reported URLs. Moreover, nearly 31% of these URLs were still active even after a week of them being reported while also being detected by very few anti-phishing tools. This suggests that a large majority of these reports remain undiscovered and underutilized. Thus, this work highlights the utility of phishing reports shared on Twitter, and the benefits of using them as an open source knowledge base for identifying new phishing websites.
网络钓鱼攻击是一种日益强大的基于网络的威胁,每月有近150万个这样的网站被创建。在这项工作中,我们通过具有安全意识的用户在Twitter上分享的报告,首次提出了识别网络钓鱼攻击的研究。我们评估了701个Twitter账户在2021年6月至8月期间发布的超过16.4万份此类报告,其中包含11.1万个唯一url,并使用各种定量和定性措施分析了它们的有效性。我们的研究结果表明,与两种流行的开源网络钓鱼源(PhishTank和OpenPhish)相比,这些报告不仅共享了大量的合法网络钓鱼url,而且还包含了更多关于网络钓鱼网站的信息(这可以加快识别和消除这些威胁的过程)。我们还注意到,Twitter报告中的url与PhishTank和OpenPhish上发现的url几乎没有重叠,而且活跃的时间也更长。然而,尽管具有这些属性,我们发现这些报告与Twitter上其他用户的互动非常少,特别是与报告url所针对的域名和组织的互动。此外,近31%的这些url在被报告一周后仍然活跃,而且很少有反网络钓鱼工具能检测到。这表明这些报告中的绝大多数仍未被发现和充分利用。因此,这项工作强调了Twitter上共享的网络钓鱼报告的效用,以及将它们用作识别新网络钓鱼网站的开源知识库的好处。
{"title":"Evaluating the Effectiveness of Phishing Reports on Twitter","authors":"S. Roy, Unique Karanjit, Shirin Nilizadeh","doi":"10.1109/eCrime54498.2021.9738786","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738786","url":null,"abstract":"Phishing attacks are an increasingly potent web-based threat, with nearly 1.5 million such websites being created on a monthly basis. In this work, we present the first study towards identifying phishing attacks through reports shared by security conscious users on Twitter. We evaluated over 16.4k such reports posted by 701 Twitter accounts between June to August 2021, which contained 11.1k unique URLs, and analyzed their effectiveness using various quantitative and qualitative measures. Our findings indicate that not only these reports share a high volume of legitimate phishing URLs, but they also contain more information regarding the phishing websites (which can expedite the process of identifying and removing these threats), when compared to two popular open-source phishing feeds: PhishTank and OpenPhish. We also noticed that the URLs in the Twitter reports had very little overlap with the URLs found on PhishTank and OpenPhish, and also remained active for longer periods of time. However, despite having these attributes, we found that these reports have very low interaction from other users on Twitter, especially from the domains and organizations which were targeted by the reported URLs. Moreover, nearly 31% of these URLs were still active even after a week of them being reported while also being detected by very few anti-phishing tools. This suggests that a large majority of these reports remain undiscovered and underutilized. Thus, this work highlights the utility of phishing reports shared on Twitter, and the benefits of using them as an open source knowledge base for identifying new phishing websites.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128213547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 APWG Symposium on Electronic Crime Research (eCrime)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1