To see the other types of publications on this topic, follow the link: Phishing.

Dissertations / Theses on the topic 'Phishing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Phishing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mei, Yuanxun. "Anti-phishing system : Detecting phishing e-mail." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2089.

Full text
Abstract:

Because of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.

The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts. Another goal is to design an anti-phishing system which can detect the phishing e-mails and then perform some operations to protect the users. Since this is a big project, I will focus on the mail detecting part that is to analyze the detected phishing emails and extract details from these mails.

A list of the most important information of this phishing mail is extracted, which contains “mail subject”, “ mail received date”, “targeted user”, “the links”, and “expiration and creation date of the domain”. The system can presently extract this information from 40% of analyzed e-mails.

APA, Harvard, Vancouver, ISO, and other styles
2

Ghani, Hajra. "Phishing : En innehållsanalys av phishing på webben." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-29012.

Full text
Abstract:
The goal with this research has been to answer questions related to social engineeringbased phishing attacks: email phishing and website phishing. This study answers questions like why these attacks occur, which type of internet users easily get tricked by phishers, Moreover this study consist of different defense mechanisms that exist against the attacks, weaknesses in them, examples to improve them and other technical solutions against them. Often the attacks consist of a combination of both email phishing and website phishing. A link can be sent to a user via email that leads to a phishing site where the user get tricked into submitting personal information.These attacks aims to steal personal information and money from users. There are anti-phishing tools in web browsers and mailsystems to protect the user. There are special phishingfilters and features that can protect users from phishing mails and detect them. Users who get attacked by phishers are those who lack knowledge about them. But since high educated people and security experts also fall for phishing beacuse phishers develop new techniques and strategies to attack users, more advanced techniques in web browsers and mail systems are needed. This study was done through a systematic litterture review where 10 articles where chosen. These articles where studied and summarised through a content analysis.
Målet med denna undersökning har varit att besvara frågor relaterat till social engineeringbaserade phishngattacker: email phishing och website phishing. Den här studien tar upp varför dessa attacker utförs, vilka användare som mest blir drabbade av de. Vidare handlar studien om olika skyddsmekanismer som existerar mot attackerna, vilka bristerna det finns i de, eventuella förbättringsförslag och förslag på andra tekniska lösningar. Oftast sker attackerna genom en kombination av email phishing och website phishing. En skadlig länk kan skickas till en användare via mail som leder till en phishingsida där användaren blir lurad till att fylla i privata uppgifter om sig själv. Dessa attacker sker främst för att stjäla personuppgifter och leder oftast till att en användare blir drabbad finansiellt. Det finns olika anti-phishing verktyg i webbläsare och mailsystem för att skydda användare. Mot email phishing finns speciella phishingfilter och olika kännetecken som hjälper till att skydda mot skadliga mail och upptäcka de. De flesta som blir drabbade av phishing är just användare som ej är medvetna om vad phishing är. Men eftersom det visat sig att även högutbildade människor och säkerhetsexperter faller för phishing då phisher utvecklar nya tekniker och strategier att utföra attacker, krävs det mer avancerade tekniska lösningar i webbläsare och mailsystem. Studien har genomförts med hjälp av en systematisk litteraturstudie, där 10 artiklar valdes ut. Dessa artiklar bearbetades och sammanfattades genom en innehållsanalys.
APA, Harvard, Vancouver, ISO, and other styles
3

Alnajim, Abdullah M. "Fighting Internet fraud : anti-phishing effectiveness for phishing websites detection." Thesis, Durham University, 2009. http://etheses.dur.ac.uk/2149/.

Full text
Abstract:
Recently, the Internet has become a very important medium of communication. Many people go online and conduct a wide range of business. They can sell and buy goods, perform different banking activities and even participate in political and social elections by casting a vote online. The parties involved in any transaction never need to meet and a buyer can sometimes be dealing with a fraudulent business that does not actually exist. So, security for conducting businesses online is vital and critical. All security-critical applications (e.g. online banking login pages) that are accessed using the Internet are at the risk of fraud. A common risk comes from so-called Phishing websites, which have become a problem for online banking and e-commerce users. Phishing websites attempt to trick people into revealing their sensitive personal and security information in order for the fraudster to access their accounts. They use websites that look similar to those of legitimate organizations and exploit the end-user's lack of knowledge of web browser clues and security indicators. This thesis addresses the effectiveness of Phishing website detection. It reviews existing anti-Phishing approaches and then makes the following contributions. First of all, the research in this thesis evaluates the effectiveness of the current most common users' tips for detecting Phishing websites. A novel effectiveness criteria is proposed and used to examine every tip and rank it based on its effectiveness score, thus revealing the most effective tips to enable users to detect Phishing attacks. The most effective tips can then be used by anti-Phishing training approaches. Secondly, this thesis proposes a novel Anti-Phishing Approach that uses Training Intervention for Phishing Websites' Detection (APTIPWD) and shows that it can be easily implemented. Thirdly, the effectiveness of the New Approach (APTIPWD) is evaluated using a set of user experiments showing that it is more effective in helping users distinguish between legitimate and Phishing websites than the Old Approach of sending anti-Phishing tips by email. The experiments also address the issues of the effects of technical ability and Phishing knowledge on Phishing websites' detection. The results of the investigation show that technical ability has no effect whereas Phishing knowledge has a positive effect on Phishing website detection. Thus, there is need to ensure that, regardless their technical ability level (expert or non-expert), the participants do not know about Phishing before they evaluate the effectiveness of a new anti-Phishing approach. This thesis then evaluates the anti-Phishing knowledge retention of the New Approach users and compares it with the knowledge retention of users who are sent anti-Phishing tips by email.
APA, Harvard, Vancouver, ISO, and other styles
4

Nordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.

Full text
Abstract:
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. Ransomware viruses often contaminate a computer through a phishing email. Hospitals are a growing target for these types of attacks because of their need of being able to access their system at all times. Objectives. This study intends to research the phishing knowledge among employees at Blekingesjukhuset and whether Blekingesjukhuset is at a risk of falling victim to a ransomware attack through a phishing email opened by an employee. Methods. This is researched by reading relevant literature and a survey sent out to employees at Blekingesjukhuset regarding their phishing knowledge. Results. The results show that the participants of the survey where overall unsure on how to detect phishing emails and thought that knowledge about the subject is necessary. Conclusions. The conclusion was made that the employees did not know what to look for in order to determine whether an email is a phishing email or not. Based on this information the conclusion can be made that it does exist a risk of Blekingesjukhuset falling victim to a ransomware attack through a phishing email unintentionally opened by an employee.
APA, Harvard, Vancouver, ISO, and other styles
5

Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Magnusson, Patrik. "Företagens skydd mot phishing." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13731.

Full text
Abstract:
Denna studie kommer undersöka hur företag hanterar phishinghotet. Phishingmail är ettangreppssätt som faller in i begreppet social engineering och kan användas för att luramänniskor att uppge information som de inte ska dela med sig av. Ett phishingmail har sommål att efterlikna ett vanligt mail som tillexempel en fakturapåminnelse. Men istället för attpengarna går till den angivna avsändaren kan attackeraren istället kapa bankuppgifterna. Målet med attacken kan vara olika, det kan vara att ta del av information så sombankuppgifter och eller lösenord. Det kan också sprida skadlig kod som infekterarmottagarens dator med virus. Phishingmail kan se ut på olika sätt och det gör det svårt att geett exakt exempel på hur ett phishingmail ser ut. Målet med denna studie är att ge en uppfattning av hur företag som intervjuas hanterarphishingattacker. Studien har som syfte att identifiera problem, för att ge en bild avhanteringen av phishingattacker. Bilden kommer besvara frågor som, vilka policys finns föratt motverka hotet, hur och när utbildas de anställda samt hur ser de själva på phishing somhot? Sammanställningen bestå av intervjuer från anställda på olika företag som ansvarar förinformationssäkerheten. Efter att intervjuerna genomförts sammanfattas svaren för att kunna utförasammanställningen. Målet med sammanställningen är att redovisa ett resultat som besvararfrågan, vilka åtgärder som finns hos organisationerna för att motverka phishinghotet.Sammanställningen har delats upp i tre huvudgrupper: handlingsplan, utbildning och kultur.Genom att placera in svaren i rätt huvudgrupp blir det en helhetsbild och ett resultat kanpresenteras.Företagen visar förståelse för i vilka problem phishingmail kan ge ett företag. Det finns i regelåtgärder på varje företag för att motverka och förminska hotet. Viss utbildning ges tillanställda. Men phishing anses inte vara ett så stort hot. Den generella uppfattningen frånföretagen är att phishing inte anses vara ett stort hot. Samtidigt berättar dom om händelser däranställda öppnar skadliga mail trotts att det inte finns något hot enligt dom själva. Efter genomförda intervjuer och insamling av information kunde en eventuell annan bristpresenteras. Flera utav de företag som kontaktades ville inte ställa upp på studien på grund avolika anledningar. Så som att det inte fanns någon IT-avdelning eller ren okunskap inomämnet. Detta kan visa på att det finns brister hos flera företag där det inte finns enhelhetslösning på hur informations ska säkras upp och hur informationssäkerheten ska utvecklas.
APA, Harvard, Vancouver, ISO, and other styles
7

Maurer, Max-Emanuel. "Counteracting phishing through HCI." Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-169668.

Full text
Abstract:
Computer security is a very technical topic that is in many cases hard to grasp for the average user. Especially when using the Internet, the biggest network connecting computers globally together, security and safety are important. In many cases they can be achieved without the user's active participation: securely storing user and customer data on Internet servers is the task of the respective company or service provider, but there are also a lot of cases where the user is involved in the security process, especially when he or she is intentionally attacked. Socially engineered phishing attacks are such a security issue were users are directly attacked to reveal private data and credentials to an unauthorized attacker. These types of attacks are the main focus of the research presented within my thesis. I have a look at how these attacks can be counteracted by detecting them in the first place but also by mediating these detection results to the user. In prior research and development these two areas have most often been regarded separately, and new security measures were developed without taking the final step of interacting with the user into account. This interaction mainly means presenting the detection results and receiving final decisions from the user. As an overarching goal within this thesis I look at these two aspects united, stating the overall protection as the sum of detection and "user intervention". Within nine different research projects about phishing protection this thesis gives answers to ten different research questions in the areas of creating new phishing detectors (phishing detection) and providing usable user feedback for such systems (user intervention): The ten research questions cover five different topics in both areas from the definition of the respective topic over ways how to measure and enhance the areas to finally reasoning about what is making sense. The research questions have been chosen to cover the range of both areas and the interplay between them. They are mostly answered by developing and evaluating different prototypes built within the projects that cover a range of human-centered detection properties and evaluate how well these are suited for phishing detection. I also take a look at different possibilities for user intervention (e.g. how should a warning look like? should it be blocking or non-blocking or perhaps even something else?). As a major contribution I finally present a model that combines phishing detection and user intervention and propose development and evaluation recommendations for similar systems. The research results show that when developing security detectors that yield results being relevant for end users such a detector can only be successful in case the final user feedback already has been taken into account during the development process.
Sicherheit rund um den Computer ist ein, für den durchschnittlichen Benutzer schwer zu verstehendes Thema. Besonders, wenn sich die Benutzer im Internet - dem größten Netzwerk unserer Zeit - bewegen, ist die technische und persönliche Sicherheit der Benutzer extrem wichtig. In vielen Fällen kann diese ohne das Zutun des Benutzers erreicht werden. Datensicherheit auf Servern zu garantieren obliegt den Dienstanbietern, ohne dass eine aktive Mithilfe des Benutzers notwendig ist. Es gibt allerdings auch viele Fälle, bei denen der Benutzer Teil des Sicherheitsprozesses ist, besonders dann, wenn er selbst ein Opfer von Attacken wird. Phishing Attacken sind dabei ein besonders wichtiges Beispiel, bei dem Angreifer versuchen durch soziale Manipulation an private Daten des Nutzers zu gelangen. Diese Art der Angriffe stehen im Fokus meiner vorliegenden Arbeit. Dabei werfe ich einen Blick darauf, wie solchen Attacken entgegen gewirkt werden kann, indem man sie nicht nur aufspürt, sondern auch das Ergebnis des Erkennungsprozesses dem Benutzer vermittelt. Die bisherige Forschung und Entwicklung betrachtete diese beiden Bereiche meistens getrennt. Dabei wurden Sicherheitsmechanismen entwickelt, ohne den finalen Schritt der Präsentation zum Benutzer hin einzubeziehen. Dies bezieht sich hauptsächlich auf die Präsentation der Ergebnisse um dann den Benutzer eine ordnungsgemäße Entscheidung treffen zu lassen. Als übergreifendes Ziel dieser Arbeit betrachte ich diese beiden Aspekte zusammen und postuliere, dass Benutzerschutz die Summe aus Problemdetektion und Benutzerintervention' ("user intervention") ist. Mit Hilfe von neun verschiedenen Forschungsprojekten über Phishingschutz beantworte ich in dieser Arbeit zehn Forschungsfragen über die Erstellung von Detektoren ("phishing detection") und das Bereitstellen benutzbaren Feedbacks für solche Systeme ("user intervention"). Die zehn verschiedenen Forschungsfragen decken dabei jeweils fünf verschiedene Bereiche ab. Diese Bereiche erstrecken sich von der Definition des entsprechenden Themas über Messmethoden und Verbesserungsmöglichkeiten bis hin zu Überlegungen über das Kosten-Nutzen-Verhältnis. Dabei wurden die Forschungsfragen so gewählt, dass sie die beiden Bereiche breit abdecken und auf die Abhängigkeiten zwischen beiden Bereichen eingegangen werden kann. Die Forschungsfragen werden hauptsächlich durch das Schaffen verschiedener Prototypen innerhalb der verschiedenen Projekte beantwortet um so einen großen Bereich benutzerzentrierter Erkennungsparameter abzudecken und auszuwerten wie gut diese für die Phishingerkennung geeignet sind. Außerdem habe ich mich mit den verschiedenen Möglichkeiten der Benutzerintervention befasst (z.B. Wie sollte eine Warnung aussehen? Sollte sie Benutzerinteraktion blockieren oder nicht?). Ein weiterer Hauptbeitrag ist schlussendlich die Präsentation eines Modells, dass die Entwicklung von Phishingerkennung und Benutzerinteraktionsmaßnahmen zusammenführt und anhand dessen dann Entwicklungs- und Analyseempfehlungen für ähnliche Systeme gegeben werden. Die Forschungsergebnisse zeigen, dass Detektoren im Rahmen von Computersicherheitsproblemen die eine Rolle für den Endnutzer spielen nur dann erfolgreich entwickelt werden können, wenn das endgültige Benutzerfeedback bereits in den Entwicklungsprozesses des Detektors einfließt.
APA, Harvard, Vancouver, ISO, and other styles
8

Kalinová, Diana. "Phishing a ľudský faktor." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-192464.

Full text
Abstract:
The main aim of the diploma thesis is to underline the importance of human factor for the success of phishing attacks and to identify the reasons, why the Czech and Slovak users are vulnerable to phishing. The thesis focuses on the user as the weakest part in the system which phishers exploit. Social and technical tricks that are cheating users are in the second chapter. The third chapter focuses on social engineering and sociological methods of attack. The fourth chapter is devoted to the delivery of phishing and fifth chapter explores the various types of phishing attacks. The sixth chapter presents the reasons for the operation of phishing, the aspects of credibility and authenticity of e-mails and web sites, that users follow and the implications of using the context in phishing. The victims of phishing have specific reactions which are mentioned in the seventh chapter. The eighth chapter explores the various measures against phishing, not just technology. Mentioned eight chapters present a theoretical basis for the following chapters of the diploma thesis. In the ninth chapter is performed analysis of the global situation of phishing. Through analysis are identified current and historical trends in phishing. Finally, the chapter shows the implications for the user. The tenth chapter is devoted to the phishing attacks in the Czech and Slovak Republic which are interesting in terms of the importance of human factor. We determine whether users are able to defend attacks only with their carefulness, mindfulness and awareness of phishing. Within the last chapter is taken empirical research through the questionnaire survey. The research verifies the awareness of the Czech and Slovak users about phishing, their personal experiences with phishing, their security habits and the aspects of credibility and authenticity that they consider in emails and websites. Based on all findings are drawn conclusions and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
9

Dong, Xun. "Defending against phishing attacks." Thesis, University of York, 2009. http://etheses.whiterose.ac.uk/2215/.

Full text
Abstract:
Valuable information, such as user authentication credentials and personal sensitive information, can be obtained by exploiting vulnerabilities within the user’s understanding of a system, and particularly a lack of understanding of the user interface. As the barrier to exploiting system vulnerabilities has increased significantly with time, attacking users has rapidly become a more efficient and effective alternative. To protect users from phishing attacks system designers and security professionals need to understand how users interact with those attacks. In this thesis I present an improved understanding of the interaction and three novel mechanisms to defend against phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Page Sophie. "Understanding the Phishing Ecosystem." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39385.

Full text
Abstract:
In “phishing attacks”, phishing websites mimic trustworthy websites in order to steal sensitive information from end-users. Despite research by both academia and the industry focusing on development of anti-phishing detection techniques, phishing has increasingly become an online threat. Our inability to slow down phishing attacks shows that we need to go beyond detection and focus more on understanding the phishing ecosystem. In this thesis, we contribute in three ways to understand the phishing ecosystem and to offer insight for future anti-phishing efforts. First, we provide a new and comparative study on the life cycle of phishing and malware attacks. Specifically, we use public click-through statistics of the Bitly URL shortening service to analyze the click-through rate and timespan of phishing and malware attacks before (and after) they were reported. We find that the efforts against phishing attacks are stronger than those against malware attacks.We also find phishing activity indicating that mitigation strategies are not taking down phishing websites fast enough. Second, we develop a method that finds similarities between the DOMs of phishing attacks, since it is known that phishing attacks are variations of previous attacks. We find that existing methods do not capture the structure of the DOM, and question whether they are failing to catch some of the similar attacks. We accordingly evaluate the feasibility of applying Pawlik and Augsten’s recent implementation of Tree Edit Distance (AP-TED)calculations as a way to compare DOMs and identify similar phishing attack instances.Our method agrees with existing ones that 94% of our phishing database are replicas. It also better discriminates the similarities, but at a higher computational cost. The high agreement between methods strengthens the understanding that most phishing attacks are variations, which affects future anti-phishing strategies.Third, we develop a domain classifier exploiting the history and internet presence of a domain with machine learning techniques. It uses only publicly available information to determine whether a known phishing website is hosted on a legitimate but compromised domain, in which case the domain owner is also a victim, or whether the domain itself is maliciously registered. This is especially relevant due to the recent adoption of the General Data Protection Regulation (GDPR), which prevents certain registration information to be made publicly available. Our classifier achieves 94% accuracy on future malicious domains,while maintaining 88% and 92% accuracy on malicious and compromised datasets respectively from two other sources. Accurate domain classification offers insight with regard to different take-down strategies, and with regard to registrars’ prevention of fraudulent registrations.
APA, Harvard, Vancouver, ISO, and other styles
11

Ameri, Haydar. "Detektering av phishing : En litteraturstudie om automatisk detektering av phishing med artificiell intelligens (AI)." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18934.

Full text
Abstract:
Det ökade antalet mejlanvändare idag har lett till en upptrappning och ytterligare problem som är relaterade till phishing. Phishing är ett stort samhällsproblem idag som drabbar både individer och organisationer. Sedan den första attacken kom 1996, verkar phishing vara ett olöst mysterium än idag. Utvecklingen av artificiell intelligens (AI) och maskininlärning (ML) har pågått länge, men i samband med introduceringen av djupinlärning (DL) 2010 så har nya innovativa lösningar tillämpats inom flera problemområden. Det här arbetet undersöker ett av dessa, nämligen automatisk detektering av phishing baserad på AI. Arbetet presenterar en överblick av AI-utveckling men också lyfter fram viktiga aspekter som är av betydelse för framtida forskning. Arbetet ger bidrag i termer av nya idéer och ny kunskap till ett nystartat projekt vid högskolan i Skövde där målet är att utveckla ett verktyg som kan varna användaren när den befinner sig i en phishing situation. Vidare har olika lösningar identifierats och presenterats med avseende på skydd åt organisationer mot phishing. Det är dock fortfarande oklart om utmaningen med phishing är löst, eftersom merparten av lösningarna inte har implementerats i verkliga miljöer. Baserat på nuvarande forskning pekar de framstegen som har gjorts inom AI att en lösning av utmaningen kan komma inom en snar framtid.
The increased number of email users today has led to an escalation and additional problems related to phishing. Phishing is a major problem for society affecting both individuals and organizations. Since the first attack came in 1996, phishing still seems to be an unsolved challenge to this day. The development of artificial intelligence (AI) and machine learning (ML) has been going on for a long time, but in connection with the introduction of deep learning (DL) in 2010, new innovative solutions have been applied in several problem areas. This thesis examines one of these, namely automatic detection of phishing based on AI. The thesis presents an overview of the developments in this area, but also highlights important aspects that are of importance for future research. The work contributes in terms of new ideas and knowledge to a newly started project at the University of Skövde where the goal is to develop a tool that can alert the user when in a phishing situation. In addition, various solutions have been identified and presented with regard to protection for organizations against phishing. However, it is still unclear if the challenge of phishing has been solved, since most of these solutions have not been implemented in realworld environments. Based on current research, advances made in the area of AI indicates that a solution to the challenge of phishing may come in the near future.
APA, Harvard, Vancouver, ISO, and other styles
12

Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.

Full text
Abstract:
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. Phishing is a growing problem that many different companies are trying to develop a working protection against. The number of new phishing-sites per month increased by 1363 % between January 2005 and October 2006, from 2560 to 37 444 attacks [3] [2]. Today there are several different antiphishing applications as well as implemented methods to prevent attacks, but it’s not certain they giving enough protection. In this paper we plan to investigate the concept of phishing to better understand the threat it provides. We will analyse 252 different phishing attacks and examine a number of existing antiphishing applications to see if there are possibilities to improve the different protection methods to improve the accuracy of such tools.
APA, Harvard, Vancouver, ISO, and other styles
13

Andersson, Måns, and Joakim Loxdal. "Why Phishing Works on Smartphones." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280092.

Full text
Abstract:
Phishing is a form of internet fraud where an attacker attempts to acquire sensitive information from a target by posing as a trustworthy entity. One strategy to fool the target is to create a spoofed (illegitimate copy) of a legitimate website. But why do people fall for spoofed sites in smartphone browsers, and what security indicators are utilized or not when a user decides the legitimacy of a website? Can smartphone browsers make it easier for users to identify phishing sites? In this study, 20 participants were observed when they analyzed and classified websites as legitimate or spoofed on their own smartphones. 17 websites (8 spoofed and 9 legitimate) were presented to the participants in random order and classified by the participants. The best phishing site fooled 50%, and on average participants classified 69% of the websites correctly, similar to previous studies results. The URL was used as an indicator by a majority of the participants (80%), a result that also matches previous similar studies. This indicates that user behaviour and ease of identifying spoofed and legitimate websites is not very different in a smartphone browser compared to a desktop computer browser. Those not evaluating the URL performed the worst. Almost all of the participants (>90%) used the content of the website (design, information, functionality) at least once when deciding if a website was spoofed or legitimate. Just one participant used Google to find the legitimate websites and compare to the one he was presented with in the study. He was the only participant with a success rate of 100%. We suggest that browsers put more emphasis on the domain name, and that browser developers should even consider hiding sub domains in the smartphone address bar.
Phishing är en typ av internetbedrägeri där en bedragare försöker komma åt känslig information från ett offer genom att utge sig för att vara någon annan. En strategi som är vanlig är att bedragaren skapar en falsk kopia av en verklig hemsida. Men varför faller användare för phishing i smartphone-webbläsare, och vilka säkerhetsindikatorer används för att avgöra om en sida är äkta eller falsk? Kan smartphone-webbläsare göra det enklare att identifiera phishing-sidor? I denna studie observerades 20 deltagare när de analyserade och klassificerade hemsidor som legitima eller falska. 17 hemsidor (8 falska och 9 äkta) presenterades för deltagarna i slumpad ordning och klassificerades. Den bästa phishing-sidan lurade 50%, men i genomsnitt gissade deltagarna rätt i 69% av fallen, ett resultat som överensstämmer med tidigare liknande studier. En majoritet av deltagarna (80%) använde URL:en som en indikator, något som också överensstämmer med tidigare studier. Detta indikerar att användares beteende och förmåga att identifiera äkta och falska hemsidor i en webbläsare inte skiljer sig särskilt mycket mellan smartphone och dator. De som inte tittade på URL:en hade lägst antal rätt. Nästan alla deltagare (>90%) använde sig av sidans innehåll (design, information, funktionalitet) åtminstone en gång när de skulle avgöra om en sida var äkta eller falsk. En enda deltagare använde Google för att hitta de legitima sidorna och jämföra med de han fick presenterade framför sig i studien. Han var den enda deltagaren som identifierade alla sidor i studien korrekt. Vi föreslår att webbläsare tydliggör domännamnet i större utsträckning och att utvecklare av webbläsare till och med bör överväga att helt dölja subdomäner i adressfältet på smartphones.
APA, Harvard, Vancouver, ISO, and other styles
14

Grönlund, Nicole. "Phishing inom organisationer : En studie om hur skydd mot phishing kopplat till mänskliga faktorer kan stärkas." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18686.

Full text
Abstract:
Med hjälp av informationsteknologi (IT) kan företag hålla sig konkurrenskraftiga, samtidigt som det öppnar upp för säkerhetshot som informationsstöld. Phishing är ett exempel på säkerhetshot, vilket innefattar att angripare tillämpar digitala enheter för att konstruera manipulativa meddelanden i syftet att få tillgång till konfidentiell information genom individer (Xiong, Proctor, Yang & Lin, 2019). Många företag investerar i teknologiska lösningar för att skydda mot säkerhetshot, varpå mänskliga faktorer ofta ignoreras (Ghafir et al., 2018). Denna studie har därmed undersökt hur skydd mot phishing kopplat till mänskliga faktorer kan stärkas, det vill säga säkerhetsmedvetenhet, säkerhetsutbildningar, säkerhetspolicies, informationssäkerhetskultur, ledning samt säkerhetsbeteende. Med hjälp av kvalitativa metodansatser har respondenter från ett samarbetsföretag intervjuats, för att besvara hur skydd mot phishing kopplat till mänskliga faktorer kan stärkas genom två delfrågor: ”Vilka brister finns avseende skydd mot phishing kopplat till mänskliga faktorer inom organisationer”? samt ”Vilka åtgärder kan organisationer ta för att förbereda anställda mot phishing-angrepp”?Studiens resultat visar att det kan förekomma brister avseende skydd mot phishing kopplat till mänskliga faktorer som ökar risken med att anställda faller för phishing-angrepp, exempelvis att det saknas information i säkerhetsutbildningar för att förbereda anställda mot phishing-angrepp, att anställda inte tar del av säkerhetspolicyn kontinuerligt, avsaknad av uppföljningsutbildningar samt att kunskap från säkerhetsutbildningar och säkerhetspolicyn glömts bort vilket öppnar upp för riskfyllda säkerhetsbeteenden. Åtgärder mot brister som identifierats i studien innefattar bland annat att anställda bör få genomgå specifik säkerhetsutbildning om phishing som exemplifierar olika typer av phishing-angrepp, en ökad kunskapsdelning bland ledning och anställda i form av att anställda rapporterar in phishing-mejl som ledningen kan informera övriga anställda om, belysa allvaret med phishing genom information om konsekvenser vilket kan leda till en attitydförändring avseende säkerhet, regelbundna uppföljningsutbildningar samt motivering och övervakning att anställda tar del och efterföljer säkerhetspolicies.
APA, Harvard, Vancouver, ISO, and other styles
15

Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.

Full text
Abstract:
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
APA, Harvard, Vancouver, ISO, and other styles
16

Hansen, David. "Strafbarkeit des Phishing nach Internetbanking-Legitimationsdaten /." Hamburg : Kovač, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016089060&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Min 1976. "Fighting phishing at the user interface." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/38314.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.
Includes bibliographical references (p. 193-199).
The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to look as if they come from a known and legitimate organization, in order to deceive users into submitting their personal, financial, or computer account information online at those fake web sites. Phishing is a semantic attack. The fundamental problem of phishing is that when a user submits sensitive information online under an attack, his mental model about this submission is different from the system model that actually performs this submission. Specifically, the system sends the data to a different web site from the one where the user intends to submit the data. The fundamental solution to phishing is to bridge the semantic gap between the user's mental model and the system model. The user interface is where human users interact with the computer system. It is where a user's intention transforms into a system operation. It is where the semantic gap happens under phishing attacks. And therefore, it is where the phishing should be solved. There are two major approaches to bridge the semantic gap at the user interface. One approach is to reflect the system model to the user.
(cont.) Anti-phishing toolbars and the browser's security indicators take this approach. User studies in this thesis show that this approach is not effective at preventing phishing. Users are required to constantly pay attention to the toolbar and are expected to have the expertise to always correctly interpret the toolbar message. Normal users meet neither of these requirements. The other approach is to let users tell the system their intentions when they are submitting data online. The system can then check if the actual submission meets the user's intention or not. If there is a semantic gap, the system can effectively warn the user about this discrepancy and provide a safe path to the user's intended site. Web Wallet, designed and implemented as a new anti-phishing solution, takes this a~pproach. It is a dedicated browser sidebar for users to submit their sensitive information online. User studies in this thesis shows that Web Wallet is not only an effective and promising anti-phishing solution but also a usable personal information manager.
by Min Wu.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
18

Knickerbocker, Paul. "Combating phishing through zero-knowledge authentication /." Connect to title online (Scholars' Bank), 2008. http://hdl.handle.net/1794/7891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Knickerbocker, Paul 1980. "Combating Phishing Through Zero-Knowledge Authentication." Thesis, University of Oregon, 2008. http://hdl.handle.net/1794/7891.

Full text
Abstract:
x, 62 p. A print copy of this thesis is available through the UO Libraries. Search the library catalog for the location and call number.
Phishing is a type of Internet fraud that uses deceptive websites to trick users into revealing sensitive information. Despite the availability of numerous tools designed to detect phishing, it remains a steadily growing threat. The failure of current anti-phishing solutions is largely due to their focus on detecting phishing rather than addressing phishing's root cause: insecure web authentication. Using a combination of the zero-knowledge mechanism and two-factor authentication I present ZeKo, an authentication mechanism that is immune from phishing attacks, cryptanalysis and man-in-the-middle attacks. ZeKo takes into account the psychological behavior of users and remains secure even when the user is deceived. The proposed system not only prevents phishing attacks but also has considerable benefits over traditional authentication mechanisms, making it well suited for a wide range of applications.
Advisers: Jun Li, Ginnie Lo, Reza Rejaie
APA, Harvard, Vancouver, ISO, and other styles
20

Mustonen, B. (Benjamin). "Phishing in email and instant messaging." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201905181856.

Full text
Abstract:
Abstract. Phishing is a constantly evolving threat in the world of information security that affects everyone, no matter if you’re a retail worker or the head of IT in a large organisation. Because of this, this thesis aims to give the reader a good overview of what phishing is, and due to its prevalence in email and instant messaging, focuses on educating the reader on common signs and techniques used in phishing in the aforementioned forms of communication. The chosen research method is literature review, as it is the ideal choice for presenting an overview of a larger subject. As a result of the research, many common phishing signs and techniques in both email and instant messaging are presented. Some of these signs include strange senders, fake domain names and spellings mistakes. With this thesis, anyone looking to improve their understanding about phishing can do so in a way that is easy to understand. Some suggestions for future research are also presented based on this thesis’ shortcomings, namely the lack of studies on phishing in instant messaging.
APA, Harvard, Vancouver, ISO, and other styles
21

Hellberg, Tim, and Daniel Keyvanpour. "An analysis of reported phishing domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162448.

Full text
Abstract:
As we become more digitalized and we rely more heavily on the internet, the more important it is to protect ourselves against phishing attacks and other types of internet frauds. Users who fall for phishing attacks risk getting sensitive information stolen such as their bank accounts. In this thesis we describe and analyze domains that use Hypertext Transfer Protocol Secure (HTTPS), an extension to the Hypertext Transfer Protocol (HTTP) used for secure communication, and the impact that these domains have on phishing. We have analyzed and performed experiments that quantify how many of the phishing domains reported to PhishTank are HTTP and HTTPS, and why phishing sites can use HTTPS and still fail to be safe. We have created a script in Java that takes a set of URLs and creates a dataset containing the domains and all certificates that have been issued to these domains, making it a useful tool to analyze phishing domains. Furthermore, we present analyses and results describing how hashing algorithms are used in different certificates and their impact in securing the web. Through analyses and experiments we gained an understanding of how easy it is to create a certificate and claim to be behind a website. Phishing domains being able to use HTTPS is a good example of this and our results have shown that many imposter websites use HTTPS. Thankfully, there are tools in place to secure the web and avoid phishing, such as browsers having a set of Certificate Authorities (CAs) that they trust, meaning that any HTTPS site that does not have a certificate from one of these CAs will be flagged as not secure. Another countermeasure is increasing people's knowledge about how to handle websites that seem to be secure and have the necessary parameters, such as HTTPS, but nevertheless are phishing sites.
APA, Harvard, Vancouver, ISO, and other styles
22

Leung, Chung-man Alvin. "An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Leung, Chung-man Alvin, and 梁仲文. "An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Slack, Andrew A. "Digital authentication for offical bulk email." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FSlack.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Garfinkel, Simson L. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Digital Authentication, S/MIME, Official bulk email, phishing. Includes bibliographical references (p. 55-57). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Ge. "Verilogo proactive phishing detection via logo recognition /." Diss., [La Jolla] : University of California, San Diego, 2010. http://wwwlib.umi.com/cr/fullcit?p1477945.

Full text
Abstract:
Thesis (M.S.)--University of California, San Diego, 2010.
Title from first page of PDF file (viewed July 16, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (leaves 38-40).
APA, Harvard, Vancouver, ISO, and other styles
26

Barnes, David S. "A defense-in-depth approach to phishing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBarnes.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Craig H. Martell, Neil C. Rowe. "September 2006." Includes bibliographical references (p. 71). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
27

Lingaas, Türk Jakob. "Comparing the relative efficacy of phishing emails." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.

Full text
Abstract:
This study aimed to examine if there was a difference in how likely a victim is to click on a phishing email’s links based on the content of the email, the tone and language used and the structure of the code. This likelihood also includes the email’s ability to bypass spam filters.  Method: The method used to examine this was a simulated phishing attack. Six different phishing templates were created and sent out via the Gophish framework to target groups of students (from Halmstad University), from a randomized pool of 20.000 users. The phishing emails contained a link to a landing page (hosted via a virtual machine) which tracked user status. The templates were: Covid19 Pre-Attempt, Spotify Friendly CSS, Spotify Friendly Button, Spotify Aggressive CSS, Spotify Aggressive Button, Student Union. Results: Covid19 Pre-Attempt: 72.6% initial spam filter evasion, 45.8% spam filter evasion, 4% emails opened and 100% links clicked. Spotify Friendly CSS: 50% initial spam filter evasion, 38% spam filter evasion, 26.3% emails opened and 0% links clicked. Spotify Friendly Button: 59% initial spam filter evasion, 28.8% spam filter evasion, 5.8% emails opened and 0 %links clicked. Spotify Aggressive CSS: 50% initial spam filter evasion, 38% spam filter evasion, 10.5% emails opened, and 100% links clicked. Spotify Aggressive Button: 16% initial spam filter evasion, 25% spam filter evasion, 0% emails opened and 0% emails clicked. Student Union: 40% initial spam filter evasion, 75% spam filter evasion, 33.3% emails opened and 100% links clicked. Conclusion: Differently structured emails have different capabilities for bypassing spam filters and for deceiving users. Language and tone appears to affect phishing email efficacy; the results suggest that an aggressive and authoritative tone heightens a phishing email’s ability to deceive users, but seems to not affect its ability to bypass spam filters to a similar degree. Authenticity appears to affect email efficacy; the results showed a difference in deception efficacy if an email was structured like that of a genuine sender. Appealing to emotions such as stress and fear appears to increase the phishing email’s efficacy in deceiving a user.
Syftet med denna studie var att undersöka om det fanns en skillnad i hur troligt det är att ett offer klickar på länkarna till ett phishing-e-postmeddelande, baserat på innehållet i e-postmeddelandet, tonen och språket som används och kodens struktur. Denna sannolikhet inkluderar även e-postens förmåga att kringgå skräppostfilter. Metod: Metoden som användes var en simulerad phishing-attack. Sex olika phishing-mallar skapades och skickades ut via Gophish-ramverket till målgruppen bestående av studenter (från Halmstads universitet), från en slumpmässig pool med 20 000 användare. Phishing-e-postmeddelandena innehöll en länk till en målsida (hostad via en virtuell maskin) som spårade användarstatus. Mallarna var: Covid19 Pre-Attempt, Spotify Friendly CSS, Spotify Friendly Button, Spotify Aggressive CSS, Spotify Aggressive Button, Student Union. Resultat: Covid19 förförsök: 72,6% kringgick det primära spamfiltret, 45,8% kringgick det sekundära spamfiltret, 4% e-postmeddelanden öppnade och 100% länkar klickade Spotify Friendly CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 26,3% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Friendly Button: 59% kringgick det primära spamfiltret, 28,8% kringgick det sekundära spamfiltret, 5.8% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Aggressive CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 10,5% e-post öppnade och 100% länkar klickade. Spotify Aggressive Button: 16% kringgick det primära spamfiltret, 25% kringgick det sekundära spamfiltret, 0% e-postmeddelanden öppnade och 0% e-postmeddelanden klickade. Studentkåren: 40% kringgick det primära spamfiltret, 75% kringgick det sekundära spamfiltret, 33,3% e-postmeddelanden öppnade och 100% länkar klickade. Slutsats: Olika strukturerade e-postmeddelanden har olika funktioner för att kringgå skräppostfilter och för att lura användare. Språk och ton tycks påverka effektiviteten för epost-phishing. Resultaten tyder på att en aggressiv och auktoritär ton ökar phishing-epostmeddelandets förmåga att lura användare, men verkar inte påverka dess förmåga att kringgå skräppostfilter i motsvarande grad. Autenticitet verkar påverka e-postens effektivitet, då resultaten visade en skillnad i effektivitet om ett e-postmeddelande var strukturerat som en äkta avsändare. Att adressera känslor som stress och rädsla verkar öka phishing-e-postens effektivitet när det gäller att lura en användare.
APA, Harvard, Vancouver, ISO, and other styles
28

Yaokai, Yang. "Effective Phishing Detection Using Machine Learning Approach." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1544189633297122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Blasi, Michael. "Techniques for detecting zero day phishing websites." [Ames, Iowa : Iowa State University], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Brandt, Astrid. "Zur Strafbarkeit des Phishing Gesetzgebung vs. Technologie." Hamburg Kovač, 2009. http://d-nb.info/997540087/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vitek, Viktor, and Shah Taqui Syed. "Implementing a Nudge to Prevent Email Phishing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.

Full text
Abstract:
Phishing is a reoccurring issue, which uses social engineering as an attack strategy. The prevention of these attacks is often content-based filters. These solutions are however not always perfect, and phishing emails can still be able to get through the filters. We suggest a new strategy to combat phishing. The strategy is a technical platform which uses the psychology concept nudge. Nudge is a concept that can be used to change a certain behaviour, in this case to make people more cautious when reading their emails.The objective of this thesis is to suggest a nudge using a technical platform regarding possible desensitization. The nudge aims to change email related behaviours to more healthy ones. To get indications if the nudge has benefits, a qualitative survey was made. When using a psychology-based solution, one must address the possibility of desensitization. To minimize possible desensitization, a quantitative analysis was made where different ways to minimize desensitization were assessed. Data for this analysis was gathered by a simulation modeling, where the simulation aimed to replicate a user performing email related events.The conclusion of the simulation results showed that a whitelist approach was the most appropriate for our nudge. The approach minimized the chance of possible desensitization while having a low risk of not performing a nudge when needed. The conclusion of the survey results was that there was an indication of behavioural change and that there existed a risk of possible desensitization.
Nätfiske är ett återkommande problem, som använder sig av social manipulation som attackstrategi. Försvar mot dessa attacker är ofta innehållsbaserade filter. Dessa lösningar är inte alltid perfekta, då nätfiske kan ibland gå förbi filterna. Vi föreslår en ny strategi för att bekämpa nätfiske. Strategin är en teknisk plattform som använder det psykologiska konceptet nudge. Nudge är ett koncept som kan användas för att ändra ett visst beteende, i detta fall för att göra människor mer försiktiga när de läser sina emails.Syftet med detta arbete är att föreslå en nudge i en teknisk plattform där man tar hänsyn till eventuell desensibilisering. Nudgens mål är att ändra emailrelaterade beteenden så att beteendena blir säkrare. En kvalitativ undersökning gjordes för att få indikationer om nudgen har möjliga fördelar. När man använder en psykologibaserad lösning så måste man ta itu med möjligheten av desensibilisering. En kvantitativ analys gjordes där olika sätt att minimera desensibilisering bedömdes, för att sedan kunna minimera desensibiliseringen. Data för denna analys samlades in genom en simuleringsmodellering, där simuleringens syfte var att replikera en användare som utför email-relaterade händelser.Slutsatsen av simuleringsresultaten visade att en whitelist-metod var den mest lämpliga för vår nudge. Metoden minimerade risken för möjlig desensibilisering, samtidigt som den hade en låg risk att inte utföra en nudge när det behövdes. Slutsatsen av undersökningsresultatet från enkäten var att det fanns en indikation för beteendeförändringar och att det fanns en risk för eventuell desensibilisering av nudgen.
APA, Harvard, Vancouver, ISO, and other styles
32

Karlsson, Nicklas. "System för att upptäcka Phishing : Klassificering av mejl." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2073.

Full text
Abstract:

Denna rapport tar en titt på phishing-problemet, något som många har råkat ut för med bland annat de falska Nordea eller eBay mejl som på senaste tiden har dykt upp i våra inkorgar, och ett eventuellt sätt att minska phishingens effekt. Fokus i rapporten ligger på klassificering av mejl och den huvudsakliga frågeställningen är: ”Är det, med hög träffsäkerhet, möjligt att med hjälp av ett klassificeringsverktyg sortera ut mejl som har med phishing att göra från övrig skräppost.” Det visade sig svårare än väntat att hitta phishing mejl att använda i klassificeringen. I de klassificeringar som genomfördes visade det sig att både metoden Naive Bayes och med Support Vector Machine kan hitta upp till 100 % av phishing mejlen. Rapporten pressenterar arbetsgången, teori om phishing och resultaten efter genomförda klassificeringstest.


This report takes a look at the phishing problem, something that many have come across with for example the fake Nordea or eBay e-mails that lately have shown up in our e-mail inboxes, and a possible way to reduce the effect of phishing. The focus in the report lies on classification of e-mails and the main question is: “Is it, with high accuracy, possible with a classification tool to sort phishing e-mails from other spam e-mails.” It was more difficult than expected to find phishing e-mails to use in the classification. The classifications that were made showed that it was possible to find up to 100 % of the phishing e-mails with both Naive Bayes and with Support Vector Machine. The report presents the work done, facts about phishing and the results of the classification tests made.

APA, Harvard, Vancouver, ISO, and other styles
33

Danesten, Jacob. "Vad gör att människor faller för Spear-Phishing?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-12552.

Full text
Abstract:
Det är inte många som känner till begreppet spear-phishing. Spear-phishing är ett sätt att attackera en person via mejl. De som utför den här typen av attacker använder sig av sociala aspekter för att lura dig. De kan säga att det är från ett företag som du som person har kontakt med. Det kan t.ex. vara från en bank eller skatteverket. Studien har som syfte att försöka förstå varför människor faller för de här attackerna och hur de kan hindra att sprida andra attacker. De virus som den här typen av attack sprider kan vara t.ex. trojaner och ransomware.
APA, Harvard, Vancouver, ISO, and other styles
34

Karlsson, Jesper. "A citizen perspective of phishing in Hong Kong." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-12439.

Full text
Abstract:
In the world of today, Internet is a part of everything we do. Almost all appliances, from the cell phone to in some cases even freezers, are getting options to connect up to the Internet. But in this great, new world lurks dangers, as new threats are developed and sent out on the Internet at the same rate with which they are resolved. The people in charge of managing their networks, be it a parent in a household or an employee at a corporation, needs knowledge of how to tackle these threats in a productive manner. Where do these people gain their knowledge and what does the public –who are joining the connected world at a rapid rate – think about having to gain this knowledge by themselves? Perhaps only a few need the knowledge of cybersecurity, or perhaps it should be covered as part of the school curriculum? This work strives to find the general opinion on this problem in one of the world’s most technologically advanced cities: Hong Kong. Data of the citizens’ opinion on the subject was collected using a questionnaire handed out to citizens in multiple public places in Hong Kong. This research could greatly benefit governments or corporations who are in the pipeline of starting up courses for cybersecurity education or businesses in need of people with that knowledge. The result was then compiled and analysed at which point the results then showed that the citizens of Hong Kong feel exposed to the threats that phishing poses. However, the majority also believed themselves capable of defending against phishing attempts. The result also showed the citizens claimed to have an understanding of phishing and a general awareness about most of the threats. The majority of the participants also thought that the responsibility to educate the populace about phishing should lie with the school system. Future work based on this study could, for example, broaden the perspective of the survey and include different types of cybersecurity threats or use the same concept, only changing the focused threat to another.
APA, Harvard, Vancouver, ISO, and other styles
35

Ibrahim, Rasha. "The effect of personality on SMS phishing vulnerability." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16711/.

Full text
Abstract:
In the last decade, cybercrime has sought to bypass technical security in place by focusing in people. Recently more attention has been given to the security of mobile devices. However, very little research has investigated the human factors of mobile phishing. This thesis investigates human aspects in relation to SMS phishing. Based on our findings, we present recommendations and opportunities for research that will help the security community to better understand phishing attacks and educate mobile users against them. The first study reports the results of a qualitative investigation of what people think and feel about mobile security. The study presents this investigation temporally by means of a series of interviews performed sequentially in multiple stages. A variation was noted in the users' responses and a theory was developed to explain such variation. The study proposed a grounded theory that suggested that human security attitude is strongly influenced by their agreeableness, conscientiousness and extraversion personality traits. The developed theory suggested that this general behaviour is moderated by individuals’ knowledge and past error-in-judgement experiences. The theory was tested via three further studies (one lab study and two experimental studies). The results suggest that the personality traits Assertiveness and Extraversion affect humans’ phishing vulnerability. To the best of our knowledge, the three studies are the first empirical studies of the human aspects involved in SMS phishing. The thesis embraces both quantitative and qualitative analysis approaches. The quantitative analysis helped in isolating the personality traits Assertiveness and Extraversion while the qualitative analysis helped us understand how individuals reason about their behaviour.
APA, Harvard, Vancouver, ISO, and other styles
36

Khanna, Isha. "Phishing on Open WLANs: Threat and Preventive Measure." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/36170.

Full text
Abstract:
Phishing is an internet security issue whose shape is still changing and size is still increasing. This thesis shows the possibility of a phishing attack on open, private Wireless LANs. Private WLANs which use a login page to authenticate users in hotels, airports and academic campuses are all vulnerable to this attack. Virginia Tech's WLAN is used as an example to show that the attack is possible. The attack combines two very well known attacks: one is to deceptively guide a user into logging into a fake website, which shows similar log-in page to the page of the website the user intends to go to, and the second attack is to show users a valid certificate, which does not show a warning. The rogue server takes the user to a log-in page which is similar to Virginia Tech's log-in page and shows him a valid security certificate. We present a solution to the proposed problem. Software is implemented that runs on Windows Vista. The software warns the user if there are servers with more than one type of security certificates, claiming to be from the same network. We contrast our method to already existing methods, and show in what respects our solution is better. The biggest advantage of this method is that it involves no change on the server side. It is not necessary for the users to have any prior knowledge of the network, which is very helpful when the users access WLAN at airports and hotels. Also, when using this method, the user does not need to connect to any network, and is still able to get a warning. It however, requires the user to be able to differentiate between the real and fake networks after the user has been warned.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
37

Abu-Nimeh, Saeed. "Phishing detection using distributed Bayesian Additive Regression Trees." Ann Arbor, Mich. : ProQuest, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3336802.

Full text
Abstract:
Thesis (Ph.D. in Computer Science and Engineering)--S.M.U.
Title from PDF title page (viewed Mar. 16, 2009). Source: Dissertation Abstracts International, Volume: 69-11, Section: B, page: . Adviser: Suku Nair. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
38

Shirazi, Hossein. "Unbiased Phishing Detection Using Domain Name Based Features." Thesis, Colorado State University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10826588.

Full text
Abstract:

Internet users are coming under a barrage of phishing attacks of increasing frequency and sophistication. While these attacks have been remarkably resilient against the vast range of defenses proposed by academia, industry, and research organizations, machine learning approaches appear to be a promising one in distinguishing between phishing and legitimate websites. There are three main concerns with existing machine learning approaches for phishing detection. The first concern is there is neither a framework, preferably open-source, for extracting feature and keeping the dataset updated nor an updated dataset of phishing and legitimate website. The second concern is the large number of features used and the lack of validating arguments for the choice of the features selected to train the machine learning classifier. The last concern relates to the type of datasets used in the literature that seems to be inadvertently biased with respect to the features based on URL or content. In this thesis, we describe the implementation of our open-source and extensible framework to extract features and create up-to-date phishing dataset. With having this framework, named Fresh-Phish, we implemented 29 different features that we used to detect whether a given website is legitimate or phishing. We used 26 features that were reported in related work and added 3 new features and created a dataset of 6,000 websites with these features of which 3,000 were malicious and 3,000 were genuine and tested our approach. Using 6 different classifiers we achieved the accuracy of 93% which is a reasonable high in this field. To address the second and third concerns, we put forward the intuition that the domain name of phishing websites is the tell-tale sign of phishing and holds the key to successful phishing detection. We focus on this aspect of phishing websites and design features that explore the relationship of the domain name to the key elements of the website. Our work differs from existing state-of-the-art as our feature set ensures that there is minimal or no bias with respect to a dataset. Our learning model trains with only seven features and achieves a true positive rate of 98% and a classification accuracy of 97%, on sample dataset. Compared to the state-of-the-art work, our per data instance processing and classification is 4 times faster for legitimate websites and 10 times faster for phishing websites. Importantly, we demonstrate the shortcomings of using features based on URLs as they are likely to be biased towards dataset collection and usage. We show the robustness of our learning algorithm by testing our classifiers on unknown live phishing URLs and achieve a higher detection accuracy of 99.7% compared to the earlier known best result of 95% detection rate.

APA, Harvard, Vancouver, ISO, and other styles
39

Floderus, Sebastian, and Linus Rosenholm. "An educational experiment in discovering spear phishing attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.

Full text
Abstract:
Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is often done through emails and it can be very hard to spot the difference between a legitimate email and a scam email. Cybercrime is a growing problem and there is many ways to inform and educate individuals on the subject.Objectives: This study intends to perform an experiment to see if an educationalsupport tool can be used to better identify phishing emails. Furthermore see if there is a difference in susceptibility between students from different university programs. Methods: A qualitative research study was used to get the necessary understanding how to properly develop a phishing educational tool. A Pretest-Posttest experiment is done to see if there is an improvement in result between an experimental group that received education and the control group that did not. Results: The result shows an overall higher score for the technical program compared to the non-technical. Comparing the pretest with the posttest shows an increase in score for the non-technical program and a decrease in score for the technical program. Furthermore 58% of the non-technical students who started the test did not complete it. Conclusions: There is a noticeable difference in susceptibility between the programs for detecting scam emails for students. However further research is needed in order to explore to what extent the education process had an impact.
APA, Harvard, Vancouver, ISO, and other styles
40

Aburrous, Maher R., M. Alamgir Hossain, F. Thabatah, and Keshav P. Dahal. "Intelligent phishing website detection system using fuzzy techniques." IEEE, 2008. http://hdl.handle.net/10454/2640.

Full text
Abstract:
Phishing websites are forged web pages that are created by malicious people to mimic web pages of real websites and it attempts to defraud people of their personal information. Detecting and identifying Phishing websites is really a complex and dynamic problem involving many factors and criteria, and because of the subjective considerations and the ambiguities involved in the detection, Fuzzy Logic model can be an effective tool in assessing and identifying phishing websites than any other traditional tool since it offers a more natural way of dealing with quality factors rather than exact values. In this paper, we present novel approach to overcome the `fuzziness¿ in traditional website phishing risk assessment and propose an intelligent resilient and effective model for detecting phishing websites. The proposed model is based on FL operators which is used to characterize the website phishing factors and indicators as fuzzy variables and produces six measures and criteria¿s of website phishing attack dimensions with a layer structure. Our experimental results showed the significance and importance of the phishing website criteria (URL & Domain Identity) represented by layer one, and the variety influence of the phishing characteristic layers on the final phishing website rate.
APA, Harvard, Vancouver, ISO, and other styles
41

Pettersson, Rickard. "En studie om hur väl svenska internetanvändare upptäcker phishing på svenska jämfört med engelska." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18957.

Full text
Abstract:
Denna studie har undersökt ett relativt outforskat område inom phishing; språkets inverkan på människors mottaglighet för phishing. Syftet med studien var att undersöka hur stor skillnaden är mellan hur bra svenska Internetanvändare kan upptäcka phishing-mejl på svenska jämfört med engelska. För detta ändamål skapades en webbenkät med 32 mejl på både svenska och engelska. De 32 mejlen delades in i fyra lika stora grupper baserat på mejlets typ och språk. Deltagarna blev sedan tillfrågade att kategorisera mejlen som antingen legitima eller phishing. Målgruppen för studien bestod av Internetanvändare mellan 18–81 år med svenska som modersmål. En kvantitativ metod tillämpades på frågeformuläret, varpå statistiska analyser användes för att besvara syftet med studien. Studiens resultat visar en signifikant skillnad (p = 0,039) mellan hur väl svenska Internetanvändare upptäcker phishing på svenska jämfört med engelska. Deltagarna identifierade felaktigt 20 % av de engelska phishing-mejlen och 17 % av de svenska phishing-mejlen som legitima. Resultatet visar svaga indikationer på att svenska Internetanvändare är bättre på att upptäcka phishing på svenska jämfört med engelska. Resultatet i studien visar även starka indikationer på att engelsk språkförmåga och IT-kompetens är betydande faktorer vid identifiering av engelska legitima mejl. Det fanns inga tecken som tyder på att dessa faktorer gjorde deltagarna bättre på att upptäcka engelska phishing-mejl. Däremot tyder resultatet på att deltagarna kan ha nyttjat icke-språkliga ledtrådar till att identifiera de engelska phishing-mejlen.
This study has examined a relatively unexplored area of phishing; the impact of language on people's susceptibility to phishing. The purpose of the study was to investigate how big the difference is between how well Swedish Internet users can detect phishing emails in Swedish compared to English. For this purpose, an online questionnaire was created containing 32 emails in both Swedish and English. The 32 emails were divided into four equally large groups based on the type and language of the email. Participants were then asked to categorize the emails as either legitimate or phishing. The target group of the study consisted of Internet users between the ages of 18 and 81 with Swedish as their native language. A quantitative method was applied to the questionnaire, whereupon statistical analyses were used to answer the purpose of the study. The results of the study show a significant difference (p = 0,039) between how well Swedish Internet users detect phishing in Swedish compared to English. The participants incorrectly identified 20% of the English phishing emails and 17% of the Swedish phishing emails as legitimate. This result shows a weak indication that Swedish internet users are better at detecting phishing in Swedish compared to English. Furthermore, the results strongly indicate that English language skills and IT-competence are important factors when identifying English legitimate emails. There were no signs indicating that those two factors made the participants better at detecting English phishing emails. However, findings in the study suggests that the participants may have used non-language cues to identify the English phishing emails.
APA, Harvard, Vancouver, ISO, and other styles
42

Martin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.

Full text
Abstract:
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals’ resistance to social engineering in phishing email detection. There were no significant relationships between participants’ scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals’ phishing and spear-phishing susceptibility.
APA, Harvard, Vancouver, ISO, and other styles
43

Nourian, Arash. "CASTLE: a social framework for collaborative anti-phishing databases." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66989.

Full text
Abstract:
A Phishing attack is a type of identity theft attempting to steal confidential and personal data like Credit Card or banking account information. Different approaches have been proposed to defeat phishing attacks. Most of the approaches rely on a database lookup approach. In this thesis, we present a framework called CASTLE that allows a collaborative approach to build and maintain the databases containing information needed for anti-phishing services. We provide the full design and discuss how phishing sites can be captured using CASTLE. A prototype of this social frame- work for collaborative anti-phishing databases is partially implemented to evaluate the performance and effectiveness of the framework against phishing attacks.
L'hame¸connage est un type de vol d'identité qui tente de voler des donnés confidentielleset personnelles comme l'information de cartes de crédit ou de comptes bancaires.Plusieurs stratégies ont été proposées pour vaincre l'hame¸connage ; la plupart d'entreelles dépendent d'une base de données. Dans cette th'ese, nous présentons le cadreCASTLE, qui incite la collaboration pour construire et entretenir des bases de donnescontenant l'information nécessaire pour contrer l'hame¸connage. Nous fournissons laconception et discutons la mani'ere avec laquelle les sites de hameonnage peuventêtre capturés a l'aide de CASTLE. Un prototype de ce cadre est partiellement misen oeuvre pour évaluer la performance et l'efficacit du cadre contre les attaques dehame¸connage.
APA, Harvard, Vancouver, ISO, and other styles
44

Canfield, Casey Inez. "Using Vigilance to Quantify Human Behavior for Phishing Risk." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/858.

Full text
Abstract:
Phishing attacks target individuals or organizations to steal information (such as credentials) or plant malware to gain broader access to IT systems. This thesis applies research on vigilance, people’s ability to detect anomalies for a sustained period, to phishing risk. I (1) measure the human component of phishing susceptibility, (2) evaluate the validity of that measurement, and (3) demonstrate an approach for applying those measurements to risk analysis and evaluating behavioral interventions. I quantify human performance using signal detection theory (SDT) for a detection task (deciding whether a message is phishing) and a behavior task (deciding what to do about a message). As applied to phishing, SDT distinguishes between users’ ability to tell the difference between phishing and legitimate emails (called sensitivity, or d’) and bias toward identifying uncertain emails as phishing or legitimate (called response bias, or c). I find that users do not sufficiently compensate for their limited detection ability when choosing behaviors, despite incorporating confidence in their ability and their assessment of the consequences of errors into their decisions. I find similar results in an initial convenience (mTurk) sample and a community sample (enrolled in the Security Behavior Observatory (SBO) study). I find weak evidence for external validity of these tasks, given no relationship between performance in the experiment and negative computer security outcomes in real life (e.g. visits to malicious URLs or presence of malicious files). These results prompt discussion of the challenges of comparing behavior in laboratory and complex real-world settings. Lastly, I create an analytic model for evaluating anti-phishing behavioral interventions in the face of random and spear phishing attacks. Our results suggest the value of focusing on more susceptible users, particularly when defending against random attacks. This recommendation applies even when the ability to identify poor detectors is imperfect. Overall, this thesis bridges the vigilance and computer security literature to improve measurement of phishing susceptibility and show the value of assessing behavioral interventions in terms of signal detection theory.
APA, Harvard, Vancouver, ISO, and other styles
45

Василега, И. А., and И. В. Люлько. "Программная реализация модуля по борьбе с фишингом." Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/4347.

Full text
Abstract:
Керівник: Ободяк В.К.
Целью предлагаемой работы является разработка технологии, которая предусматривает возможность взаимодействия с анти- фишинговым модулем. При этом не используются списки исключений, а создается список разрешенных сайтов и потенциально проблемная ссылка сверяется с указанным списком разрешенных сайтов. При цитировании документа, используйте ссылку http://essuir.sumdu.edu.ua/handle/123456789/4347
APA, Harvard, Vancouver, ISO, and other styles
46

Megaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.

Full text
Abstract:
E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
APA, Harvard, Vancouver, ISO, and other styles
47

Kuo, Chuan-Chi. "Multi-layered regulation of phishing attacks : a Taiwan case study." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/67171/.

Full text
Abstract:
This research examines the regulation of phishing in Taiwan, particularly focusing on legal regulation but within a context of a multi-dimensional regulatory framework which also necessarily includes an examination of international regulation and the interaction between international and Taiwan regulatory interfaces given the transnational nature of phishing. Phishing is a malicious cyber activity which targets the acquisition of various types of confidential information by deception through the use of spoofed emails and/or websites. The increasing threat of phishing to information security has inspired a growing demand for regulation. Significant effort has been made in academic research and by industry to develop regulatory measures for phishing, which is dominated by technological work with comparatively little research on legal regulation. The current legal discussion of phishing, both international and Taiwan, very often concentrates on the criminal liability of phishers and pays little attention to the alternative role of law in the regulation of phishing. Thus this research suggests a broader approach to legal regulation that goes beyond criminal law and particularly addresses the role of information privacy law which constrains phishing by ensuring the protection of personal information. Phishing has posed crucial challenges to the traditional system in terms of both criminalization and legal enforcement. The solution that has been mostly addressed by the existing research is cooperation. As phishing is frequently a global phenomenon, this research suggests that an international approach involving coordination of legal standards and cross-border cooperation of law enforcement is necessary to tackle phishing, and also suggests that the fundamental step lies in a converged regulation of phishing consistent with its true context. Weak legal enforcement is a major deterrent to the effectiveness of legal regulation which highlights a need for a broad from of regulation that goes beyond law. In addition, a successful phishing episode involves a complex of factors including not only weakness in law but also vulnerability of technical infrastructure, administrative system and user awareness. A single solution is thus unlikely to deal with phishing. This research therefore suggests a multi-dimensional regulatory framework comprising different countermeasures developed especially in the areas of law, technology, education, and institutional network. It examines the anti-phishing approach undertaken in Taiwan employing qualitative methods to supplement the doctrinal research. In the context of a shortage of Taiwan scholarship on this subject, the research provides a set of suggestions to Taiwan development of a multi-dimensional regulatory scheme.
APA, Harvard, Vancouver, ISO, and other styles
48

Steding-Jessen, Klaus. "Uso de honeypots para o estudo de spam e phishing." Instituto Nacional de Pesquisas Espaciais, 2008. http://urlib.net/sid.inpe.br/mtc-m18@80/2008/08.18.19.02.

Full text
Abstract:
Este trabalho propoe uma infra-estrutura extensível de sensores, baseada em honeypots, para estudar o problema do spam e do phishing, de modo a obter dados mais detalhados sobre o problema. Esta infra-estrutura permite a correlação desses dados com aqueles capturados por outros sensores, também com base em honeypots. Um protótipo desta infra-estrutura foi implementado e teve enfoque em obter dados sobre o abuso de relays e proxies abertos, a obtenção de endereços de email em sites Internet, a coleta de URLs enviadas através de mensagens de pop-up e a correlação de todos estes dados com atividades relacionadas com spam, capturadas pelo Consórcio Brasileiro de Honeypots. Este protótipo esteve em operação por diversos meses e coletou dados sobre vários aspectos do problema do spam, permitindo a obteção de um conjunto de métricas que auxiliam a compreensão da situação no Brasil. Os resultados da operação deste protótipo mostram a intensidade do abuso de relays e proxies abertos em redes brasileiras, a origem e o destino destes spams, os indícios de envio a partir de máquinas infectadas e as características do harvesting de endereços de email. Como resultado da análise destes dados sao apresentadas propostas de mitigação para os problemas observados.
This work presents an extensible honeypot-based infrastructure to study the spam and phishing problem in order to obtain more detailed data on it. This infrastructure allows the correlation of the former data with data captured by other sensors also based on honeypots. A prototype of this infrastructure was implemented with the aim of obtaining data about the following: abuse of open relays and open proxies, email address harvesting, pop-up spam, and the correlation of these data with spam-related activities captured by the Brazilian Honeypots Alliance. This prototype was in operation for several months and collected data on several aspects of the spam problem. This allowed the generation of metrics to help understand the spam problem in Brazil. The obtained results show the magnitude of open relays and open proxies abuse in Brazilian networks, the source and the destination of these spams, the evidence of spam being sent from infected computers, and the characteristics of email harvesting. As a result of the analysis, some mitigation techniques for the observed problems are proposed.
APA, Harvard, Vancouver, ISO, and other styles
49

Raqab, Alah. "GAINING MONITORING CAPABILITIES AND INSIGHTS INTO RESPONSES FROM PHISHING DATA." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397504041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Andersson, Niklas. "Hur träning om phishing ändrar synen på ett säkert mail : En kvalitativ studie om hur mentala modeller av ett säkert mail förändras av träning om phishing." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176613.

Full text
Abstract:
Denna studie undersökte hur den mentala modellen av ett säkert mail ser ut hos en användare som inte har tidigare träning inom informationssäkerhet. Deltagarna testades först en gång och fick sedan ta del av träningsmaterial om phishing, och blev sen testade igen för att se hur den mentala modellen förändrades. Detta uppnåddes med semistrukturerade intervjuer. Deltagarna blev tilldelade en roll att spela och visades sedan mail och blev ombedda att säga hur de, i sin roll, skulle hantera mailet. Intervjun var sedan strukturerad kring deras svar. Intervjuerna transkriberades ordagrant och analyserades med en innehållsanalys. Resultatet visade att före träning så bestod den mentala modellen av temana mailadress, bekantskap, utseende, relevans, länkar och språk. Efter träningen bestod den mentala modellen av temana mailadress, bekantskap, utseende, relevans, länkar, språk, filformat, begärd information och kontrollerbarhet.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography