Phishing

网络钓鱼
  • 文章类型: Journal Article
    随着技术的进步,金融开发策略已经扩展到在线领域。由于年龄和阿尔茨海默病相关的认知变化,老年人可能特别容易受到在线诈骗的影响。在这项研究中,182名18至90岁的成年人接受了认知评估,载脂蛋白Ee4(APOE4)的基因分型,并完成了基于实验室的短网络钓鱼电子邮件怀疑测试(S-PEST)以及现实生活中的网络钓鱼任务(PHIT)。在这两种范式中,年龄较大预测对网络钓鱼的易感性增加,在具有较低工作记忆的较老的APOE4等位基因携带者中,这种增强的易感性明显。此外,两项网络钓鱼任务的性能相关,因为S-PEST中区分网络钓鱼和安全电子邮件的能力降低预示着PHIT中更大的网络钓鱼易感性.目前的研究发现年龄较大,APOE4和较低的认知作为网络钓鱼漏洞的风险因素,并引入S-PEST作为易于管理的,评估网络钓鱼敏感性的生态有效工具。
    With technological advancements, financial exploitation tactics have expanded into the online realm. Older adults may be particularly susceptible to online scams due to age- and Alzheimer\'s disease-related changes in cognition. In this study, 182 adults ranging from 18 to 90 years underwent cognitive assessment, genotyping for apolipoprotein E e4 (APOE4), and completed the lab-based Short Phishing Email Suspicion Test (S-PEST) as well as the real-life PHishing Internet Task (PHIT). Across both paradigms, older age predicted heightened susceptibility to phishing, with this enhanced susceptibility pronounced among older APOE4 allele carriers with lower working memory. Additionally, performance in both phishing tasks was correlated in that reduced ability to discriminate between phishing and safe emails in S-PEST predicted greater phishing susceptibility in PHIT. The current study identifies older age, APOE4, and lower cognition as risk factors for phishing vulnerability and introduces S-PEST as an easy-to-administer, ecologically valid tool for assessing phishing susceptibility.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    互联网技术的出现导致了电子交易的泛滥和使用互联网进行电子交易,导致对敏感用户信息的未经授权访问和企业资源的枯竭。因此,网络钓鱼明显增多,现在被认为是最常见的在线盗窃类型之一。网络钓鱼攻击通常针对获取机密信息,例如在线银行平台和敏感系统的登录凭据。此类攻击的主要目的是获取特定的个人信息,以用于经济利益或进行身份盗窃。最近进行了研究,通过检查网站地址等领域特征来打击网络钓鱼攻击,网站上的内容,以及网站及其源代码的两种方法的组合。然而,企业需要更有效的反网络钓鱼技术来识别网络钓鱼URL并保护其用户。本研究旨在评估八种机器学习(ML)和深度学习(DL)算法的有效性,包括支持向量机(SVM),k-最近邻(KNN),随机森林(RF),决策树(DT)极端梯度提升(XGBoost),逻辑回归(LR),卷积神经网络(CNN)和DL模型,并评估它们在识别网络钓鱼方面的性能。这项研究利用了两个真实的数据集,Mendeley和UCI,采用诸如准确性、精度,召回,假阳性率(FPR),F-1得分。值得注意的是,CNN表现出卓越的准确性,强调其功效。贡献包括使用特定用途的数据集,细致的特征工程,为班级不平衡引入SMOTE,结合了新的CNN模型,和严格的超参数调整。这项研究表明,两个数据集的模型性能一致,强调稳定性和可靠性。
    The advent of Internet technologies has resulted in the proliferation of electronic trading and the use of the Internet for electronic transactions, leading to a rise in unauthorized access to sensitive user information and the depletion of resources for enterprises. As a consequence, there has been a marked increase in phishing, which is now considered one of the most common types of online theft. Phishing attacks are typically directed towards obtaining confidential information, such as login credentials for online banking platforms and sensitive systems. The primary objective of such attacks is to acquire specific personal information to either use for financial gain or commit identity theft. Recent studies have been conducted to combat phishing attacks by examining domain characteristics such as website addresses, content on websites, and combinations of both approaches for the website and its source code. However, businesses require more effective anti-phishing technologies to identify phishing URLs and safeguard their users. The present research aims to evaluate the effectiveness of eight machine learning (ML) and deep learning (DL) algorithms, including support vector machine (SVM), k-nearest neighbors (KNN), random forest (RF), Decision Tree (DT), Extreme Gradient Boosting (XGBoost), logistic regression (LR), convolutional neural network (CNN), and DL model and assess their performances in identifying phishing. This study utilizes two real datasets, Mendeley and UCI, employing performance metrics such as accuracy, precision, recall, false positive rate (FPR), and F-1 score. Notably, CNN exhibits superior accuracy, emphasizing its efficacy. Contributions include using purpose-specific datasets, meticulous feature engineering, introducing SMOTE for class imbalance, incorporating the novel CNN model, and rigorous hyperparameter tuning. The study demonstrates consistent model performance across both datasets, highlighting stability and reliability.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    虽然新冠肺炎疫情的第二波让世界步履蹒跚,过去几个月也导致了新一轮的网络犯罪。以下文章分析了与大流行相关的网络犯罪的背景和表现,并展示了我们的刑法系统如何能够应对冠状病毒时代的当前挑战。
    While the second wave of the Covid-19 pandemic is keeping the world on tenterhooks, the last few months have also led to a new wave of cybercrime. The following article analyzes the background and manifestations of pandemic-related cybercrimes and shows how our criminal law systems are able to deal with current challenges in the age of the coronavirus.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    恶意统一资源定位符(URL)在网络攻击中普遍存在,特别是在旨在窃取敏感信息或分发恶意软件的网络钓鱼尝试中。因此,准确检测恶意URL至关重要。之前的研究已经探索了使用深度学习模型来识别恶意URL,使用将URL字符串分段为字符级或单词级令牌,嵌入和使用训练好的模型来区分URL。在这项研究中,设计了基于变压器(BERT)模型的双向编码器表示来标记URL字符串,利用其自我注意机制来增强对令牌之间相关性的理解。随后,分类器被用来确定给定的URL是否是恶意的。在评估提出的方法时,使用了三种不同类型的公共数据集:仅由Kaggle的URL字符串组成的数据集,仅包含来自GitHub的URL功能的数据集,和一个数据集,包括来自新不伦瑞克省大学的两种类型的数据,即,ISCX2016。该系统的准确率达到98.78%,96.71%,在三个数据集上为99.98%,分别。此外,在来自不同域的两个数据集上进行了实验-物联网(IoT)和基于HTTPS的域名系统(DoH)-以证明所提出模型的多功能性。
    Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. In this study, a bidirectional encoder representation from a transformers-based (BERT) model was devised to tokenize URL strings, employing its self-attention mechanism to enhance the understanding of correlations among tokens. Subsequently, a classifier was employed to determine whether a given URL was malicious. In evaluating the proposed methods, three different types of public datasets were utilized: a dataset consisting solely of URL strings from Kaggle, a dataset containing only URL features from GitHub, and a dataset including both types of data from the University of New Brunswick, namely, ISCX 2016. The proposed system achieved accuracy rates of 98.78%, 96.71%, and 99.98% on the three datasets, respectively. Additionally, experiments were conducted on two datasets from different domains-the Internet of Things (IoT) and Domain Name System over HTTPS (DoH)-to demonstrate the versatility of the proposed model.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    网络安全已经看到越来越频繁的网络攻击和受保护的健康信息(PHI)的暴露和影响。采用电子病历(EMR),物联网(IoT)设备的指数级采用,COVID-19大流行的影响增加了医疗保健部门网络攻击的威胁表面。在医疗保健领域,更具体地说,在麻醉和重症监护中,每天在几乎每位患者的护理中使用的有线和无线设备激增-医疗物联网(IoMT);呼吸机,麻醉机,输液泵,起搏装置,器官支持和过多的监测方式。所有这些设备,一旦连接到医院网络,为恶意政党提供了另一个进入医院系统的机会,要么获得PHI的财务,政治或其他利益,或直接攻击系统以导致错误的监控,更改任何设备的设置,甚至通过此IoMT窗口访问EMR。IoMT的这种指数增长以及麻醉和ICU设备以及可植入设备的无线连接的增加对患者安全构成了现实和当前的危险。有,同时,一直是医疗保健网络安全的长期资金不足。网络安全投资的缺乏使该行业暴露在外,随着PHI的货币化,引入技术上不安全的物联网设备,用于监控和直接患者护理,医疗保健行业正面临进一步毁灭性的网络攻击或PHI的违规行为。再加上COVID-19大流行给医疗保健和许多护理人员工作模式的变化带来的巨大压力,这进一步扩大了该部门遭受网络攻击的风险。
    Cybersecurity has seen an increasing frequency and impact of cyberattacks and exposure of Protected Health Information (PHI). The uptake of an Electronic Medical Record (EMR), the exponential adoption of Internet of Things (IoT) devices, and the impact of the COVID-19 pandemic has increased the threat surface presented for cyberattack by the healthcare sector. Within healthcare generally and, more specifically, within anaesthesia and Intensive Care, there has been an explosion in wired and wireless devices used daily in the care of almost every patient-the Internet of Medical Things (IoMT); ventilators, anaesthetic machines, infusion pumps, pacing devices, organ support and a plethora of monitoring modalities. All of these devices, once connected to a hospital network, present another opportunity for a malevolent party to access the hospital systems, either to gain PHI for financial, political or other gain or to attack the systems directly to cause erroneous monitoring, altered settings of any device and even to access the EMR via this IoMT window. This exponential increase in the IoMT and the increasing wireless connectivity of anaesthesia and ICU devices as well as implantable devices presents a real and present danger to patient safety. There has, at the same time, been a chronic underfunding of cybersecurity in healthcare. This lack of cybersecurity investment has left the sector exposed, and with the monetisation of PHI, the introduction of technically unsecure IoT devices for monitoring and direct patient care, the healthcare sector is presenting itself for further devastating cyberattacks or breaches of PHI. Coupled with the immense strain that the COVID-19 pandemic has placed on healthcare and the changes in working patterns of many caregivers, this has further amplified the exposure of the sector to cyberattacks.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    要设计针对电子邮件网络钓鱼的预防政策措施,了解当前应用的网络钓鱼方案和趋势是有帮助的。网络钓鱼方案和模式如何出现和适应是一个正在进行的研究领域。现有的网络钓鱼作品已经揭示了一套丰富的网络钓鱼方案,模式,以及提供对所用机制的洞察的趋势。然而,关于电子邮件网络钓鱼在社交干扰期间如何受到影响的知识似乎有限,例如COVID-19,其中网络钓鱼数量翻了两番。因此,我们调查了COVID-19大流行如何影响大流行第一年发送的网络钓鱼电子邮件。电子邮件内容(标题数据和html正文,不包括.附件)进行评估,以评估大流行随着时间的推移如何影响网络钓鱼电子邮件的主题(峰值和趋势),电子邮件活动是否与COVID-19大流行的重大事件和趋势相关,以及隐藏的内容揭示了什么。这是通过对在大流行开始期间收集的针对荷兰注册顶级域名的500.000网络钓鱼电子邮件的主体进行深入分析来研究的。研究表明,大多数与COVID-19相关的网络钓鱼电子邮件都遵循已知的模式,表明肇事者更有可能适应,而不是重塑他们的计划。
    To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phishing works already reveal a rich set of phishing schemes, patterns, and trends that provide insight into the mechanisms used. However, there seems to be limited knowledge about how email phishing is affected in periods of social disturbance, such as COVID-19 in which phishing numbers have quadrupled. Therefore, we investigate how the COVID-19 pandemic influences the phishing emails sent during the first year of the pandemic. The email content (header data and html body, excl. attachments) is evaluated to assess how the pandemic influences the topics of phishing emails over time (peaks and trends), whether email campaigns correlate with momentous events and trends of the COVID-19 pandemic, and what hidden content revealed. This is studied through an in-depth analysis of the body of 500.000 phishing emails addressed to Dutch registered top-level domains collected during the start of the pandemic. The study reveals that most COVID-19 related phishing emails follow known patterns indicating that perpetrators are more likely to adapt than to reinvent their schemes.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    最近,网络钓鱼攻击已成为公共互联网用户面临的最突出的社会工程攻击之一,政府,和企业。为了应对这种威胁,本文提出了对机器学习是什么的完整愿景,网络钓鱼者正在使用不同类型的网络钓鱼攻击技术来欺骗易受骗的用户,并且根据我们的调查,网络钓鱼电子邮件对我们将要比较的目标部门和用户最有效。因此,需要更有效的网络钓鱼检测技术来遏制近年来以惊人速度增长的网络钓鱼电子邮件的威胁,因此,将讨论通过机器学习算法缓解网络钓鱼的技术,以及为缓解网络钓鱼问题而提出的技术解决方案,以及用户应该意识到的有价值的意识知识,以检测和防止被网络钓鱼诈骗所欺骗。在这项工作中,我们提出了一种使用机器学习技术的检测模型,通过拆分数据集来训练检测模型,并使用测试数据验证结果,为了捕捉电子邮件文本的固有特征,以及使用三个不同数据集分类为网络钓鱼或非网络钓鱼的其他功能,在对它们进行比较之后,我们获得了最多数量的特征使用了最准确和最有效的结果。在所应用的数据集上,增强决策树的最佳ML算法精度连续为0.88,1.00和0.97.
    Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this threat, this paper proposes to give a complete vision to what Machine learning is, what phishers are using to trick gullible users with different types of phishing attacks techniques and based on our survey that phishing emails is the most effective on the targeted sectors and users which we are going to compare as well. Therefore, more effective phishing detection technology is needed to curb the threat of phishing emails that are growing at an alarming rate in recent years, thus will discuss the techniques of mitigation of phishing by Machine learning algorithms and technical solutions that have been proposed to mitigate the problem of phishing and valuable awareness knowledge users should be aware to detect and prevent from being duped by phishing scams. In this work, we proposed a detection model using machine learning techniques by splitting the dataset to train the detection model and validating the results using the test data , to capture inherent characteristics of the email text, and other features to be classified as phishing or non-phishing using three different data sets, After making a comparison between them, we obtained that the most number of features used the most accurate and efficient results achieved. the best ML algorithm accuracy were 0.88, 1.00, and 0.97 consecutively for boosted decision tree on the applied data sets.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    规范决策理论被证明不足以对人类对高级持续威胁(APT)攻击的社会工程活动的反应进行建模。行为决策理论票价更好,但是仍然无法捕获通过情感和外围路线说服而运作的社会工程攻击媒介。我们介绍了一个广义的决策理论,根据该标准,任何决定都将根据多个共存的选择标准之一做出。我们用C$\\mathcal{C}$表示可能的选择标准集。因此,当|CEU|=1$|\\mathcal{C}_{\\text{EU}}|=1$时,所提出的模型简化为传统的期望效用理论,而双重过程(快速思考与思维缓慢)决策对应于具有|CDP|=2$|\\mathcal{C}_{\\text{DP}}|=2$的模型。我们考虑一个更一般的情况,|C|≥2$|\\mathcal{C}|\\ge2$,这就需要仔细考虑,对于特定的choice-task实例,一个标准凌驾于其他标准之上。我们通过概率分布来实现此操作,该概率分布取决于决策者的特征以及选择选项的上下文和框架。鉴于现有的网络钓鱼检测的信号检测理论(SDT)模型混合了不同的外围路线说服途径,在本描述性概括中,明确地识别和表示了不同的途径。从这个提法中可以立即得出许多含义,从安全漏洞风险的条件性到划定安全培训有效测试的先决条件。此外,该模型解释了APT攻击的“垫脚石”渗透模式,混淆了基于规范合理性的建模方法。
    Normative decision theory proves inadequate for modeling human responses to the social-engineering campaigns of advanced persistent threat (APT) attacks. Behavioral decision theory fares better, but still falls short of capturing social-engineering attack vectors which operate through emotions and peripheral-route persuasion. We introduce a generalized decision theory, under which any decision will be made according to one of multiple coexisting choice criteria. We denote the set of possible choice criteria by C $\\mathcal {C}$ . Thus, the proposed model reduces to conventional Expected Utility theory when | C EU | = 1 $|\\mathcal {C}_{\\text{EU}}|=1$ , while Dual-Process (thinking fast vs. thinking slow) decision making corresponds to a model with | C DP | = 2 $|\\mathcal {C}_{\\text{DP}}|=2$ . We consider a more general case with | C | ≥ 2 $|\\mathcal {C}|\\ge 2$ , which necessitates careful consideration of how, for a particular choice-task instance, one criterion comes to prevail over others. We operationalize this with a probability distribution that is conditional upon traits of the decisionmaker as well as upon the context and the framing of choice options. Whereas existing signal detection theory (SDT) models of phishing detection commingle the different peripheral-route persuasion pathways, in the present descriptive generalization the different pathways are explicitly identified and represented. A number of implications follow immediately from this formulation, ranging from the conditional nature of security-breach risk to delineation of the prerequisites for valid tests of security training. Moreover, the model explains the \"stepping-stone\" penetration pattern of APT attacks, which has confounded modeling approaches based on normative rationality.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    如今,由于移动电话提供的大量功能,移动电话用户的增长显着增加。这些设备正在迅速用于访问Web和许多在线服务。然而,智能手机中可用的安全机制尚未成熟。因此,智能手机容易受到各种类型的攻击,如网络钓鱼。智能手机上的浏览器非常琐碎,智能手机的安全能力已经减弱,以匹配智能手机的功能。因此,恶意网站的检测与先前已知的技术不同,在桌面上使用。已经开发了许多用于移动设备的反网络钓鱼技术,但是,缺乏全面的解决方案。因此,本文提出了一种检测恶意移动网页的有效方法。所提出的方法APuML(使用机器学习的反网络钓鱼)从给定的URL中提取所有静态和站点流行度特征以创建特征向量。然后将适当的机器学习分类算法应用于特征集以获得结果并相应地更新数据库。在我们的方法中,随机森林分类器优于其他分类器,检测准确率达到93.85%。我们还为用户创建了一个端点应用程序,以便使用他/她的移动设备与我们的系统进行交互。此外,所提出的方法可以识别逐车下载攻击,零日攻击和点击劫持攻击具有较高的准确性。
    Nowadays, the growth of mobile phones users has gained a significant increase because of the features offered by them in abundant amounts. These devices are being used rapidly for accessing the web and many online services. However, the security mechanisms that are available in smartphones are not yet mature. Therefore, smartphones are vulnerable to various types of attacks, such as phishing. The browsers on smartphones are very trivial and the smartphones security abilities have been lessened, to match the smartphone\'s capabilities. Therefore, detection of the malicious website is different from the previously known technique, which is used on the desktop. Many anti-phishing techniques for mobile devices have been developed but still, there is a lack of a full-fledged solution. Therefore, this paper presents an efficient approach to detect malicious mobile webpages. The proposed approach APuML (Anti Phishing using Machine Learning) extracts all the static and site popularity features from the given URL to create a feature vector. An appropriate machine learning classification algorithm is then applied on the feature set to obtain the result and update the database accordingly. In our approach, the Random Forest classifier outperforms over other classifiers and achieved detection accuracy of 93.85%. We have also created an endpoint application for the users to interact with our system using his/her mobile devices. Moreover, the proposed approach can identify drive-by downloads attack, zero-day attack and clickjacking attack with high accuracy.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    神经网络创建类似于人类神经系统的基于神经元的网络,以有效地解决分类问题。smishing问题是一个二元分类问题,攻击者通过短信将智能手机用户作为目标。由于smishing是一个显着的网络安全问题,这些天困扰研究人员和智能手机用户。使用最有效的算法解决这个安全问题是小时的需要。该手稿提出了作者在“SmishingDetector”模型中提出的模型的算法,并使用神经网络实现了该算法。所获得的结果证明了神经网络在检测模糊问题方面的有效性。神经网络优于其他机器学习算法,差异为1.11%。神经网络的最终准确率为97.40%。在本文中,系统使用神经网络提取了smishingSMS(短消息服务)的最有效特征。该手稿还报告了系统所选择和实施的每个功能的准确性。从实现中可以明显看出,所选择的每个特征在smishing检测中都是最有效的,而URL(统一资源定位符)特征是最有效的特征,准确率为94%。
    Neural network creates a neuron-based network similar to the human nervous system to solve classification problems efficiently. The smishing problem is a binary classification problem in which attackers target smartphone users through text messages. As smishing is a remarkable cybersecurity issue that is troubling researchers and smartphone users these days. Addressing this security issue using the most efficient algorithm is the need of the hour. This manuscript presented an algorithm for the model proposed by authors in \'Smishing Detector\' model and implemented it using Neural Network. The result obtained proves that the neural network is much efficient in detecting smishing problem. Neural Network outperformed other machine learning algorithms with a difference of 1.11%. Neural Network performed with the final accuracy of 97.40%. In this paper, system extracted the most efficient features of smishing SMS (Short Message Service) using the Neural Network. This manuscript also reported the accuracy shown by the system for each feature selected and implemented. It is evident from the implementation that each feature selected is most effective in smishing detection and URL (Uniform Resource Locator) feature is the most effective feature with an accuracy of 94%.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

公众号