Phishing

网络钓鱼
  • 文章类型: Journal Article
    互联网技术的出现导致了电子交易的泛滥和使用互联网进行电子交易,导致对敏感用户信息的未经授权访问和企业资源的枯竭。因此,网络钓鱼明显增多,现在被认为是最常见的在线盗窃类型之一。网络钓鱼攻击通常针对获取机密信息,例如在线银行平台和敏感系统的登录凭据。此类攻击的主要目的是获取特定的个人信息,以用于经济利益或进行身份盗窃。最近进行了研究,通过检查网站地址等领域特征来打击网络钓鱼攻击,网站上的内容,以及网站及其源代码的两种方法的组合。然而,企业需要更有效的反网络钓鱼技术来识别网络钓鱼URL并保护其用户。本研究旨在评估八种机器学习(ML)和深度学习(DL)算法的有效性,包括支持向量机(SVM),k-最近邻(KNN),随机森林(RF),决策树(DT)极端梯度提升(XGBoost),逻辑回归(LR),卷积神经网络(CNN)和DL模型,并评估它们在识别网络钓鱼方面的性能。这项研究利用了两个真实的数据集,Mendeley和UCI,采用诸如准确性、精度,召回,假阳性率(FPR),F-1得分。值得注意的是,CNN表现出卓越的准确性,强调其功效。贡献包括使用特定用途的数据集,细致的特征工程,为班级不平衡引入SMOTE,结合了新的CNN模型,和严格的超参数调整。这项研究表明,两个数据集的模型性能一致,强调稳定性和可靠性。
    The advent of Internet technologies has resulted in the proliferation of electronic trading and the use of the Internet for electronic transactions, leading to a rise in unauthorized access to sensitive user information and the depletion of resources for enterprises. As a consequence, there has been a marked increase in phishing, which is now considered one of the most common types of online theft. Phishing attacks are typically directed towards obtaining confidential information, such as login credentials for online banking platforms and sensitive systems. The primary objective of such attacks is to acquire specific personal information to either use for financial gain or commit identity theft. Recent studies have been conducted to combat phishing attacks by examining domain characteristics such as website addresses, content on websites, and combinations of both approaches for the website and its source code. However, businesses require more effective anti-phishing technologies to identify phishing URLs and safeguard their users. The present research aims to evaluate the effectiveness of eight machine learning (ML) and deep learning (DL) algorithms, including support vector machine (SVM), k-nearest neighbors (KNN), random forest (RF), Decision Tree (DT), Extreme Gradient Boosting (XGBoost), logistic regression (LR), convolutional neural network (CNN), and DL model and assess their performances in identifying phishing. This study utilizes two real datasets, Mendeley and UCI, employing performance metrics such as accuracy, precision, recall, false positive rate (FPR), and F-1 score. Notably, CNN exhibits superior accuracy, emphasizing its efficacy. Contributions include using purpose-specific datasets, meticulous feature engineering, introducing SMOTE for class imbalance, incorporating the novel CNN model, and rigorous hyperparameter tuning. The study demonstrates consistent model performance across both datasets, highlighting stability and reliability.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    目的:据报道,不同专业的放射科教师在两周内平均收到20.7份向虚假期刊提交手稿的邀请,以及4.1份在不合适的活动中发言的邀请。放射学受训者还收到来自未知发件人的大量未经请求的邀请,要求他们提交手稿并在会议上发言。由于潜在的天真,受训者可能更容易受到掠夺性邀请。我们旨在确定放射科学员收到的这些垃圾邮件邀请的流行程度。
    方法:为评估放射学受训者关于掠夺性出版物和会议的网络钓鱼诈骗的经验而设计的调查已发送给放射学住院医师和神经放射学研究金计划领导,以在受训者中重新分配,并在社交媒体平台上做广告。该调查于2023年9月28日首次发布,两周后于2023年10月12日结束。斯皮尔曼的相关性,进行了单变量和多变量线性回归分析。
    结果:我们的研究包括151名完成调查的受访者。在调查受访者中,53%报告收到来自掠夺性出版物的未经请求的电子邮件(平均值=6.76±7.29),32%报告收到来自欺诈性会议的电子邮件(平均值=5.61±5.77)。在未经请求的电子邮件邀请数量与PubMed索引出版物数量之间观察到显着正相关,编号作为相应的作者,开放获取期刊的数量和摘要演示文稿的数量。
    结论:放射学领域的学员会收到许多未经请求的邀请发表论文以及在未经认可的会议上发表论文。这可能会导致毫无戒心的受训人员浪费时间和财政资源。
    OBJECTIVE: Radiology faculty across various specialties have been reported to receive an average of 20.7 invitations to submit manuscripts to bogus journals and 4.1 invitations to speak at unsuitable events over a two-week span. Radiology trainees also receive a fair number of unsolicited invitations from unknown senders to submit manuscripts and speak at meetings. Trainees can be more vulnerable to predatory invitations due to potential naivety. We aimed to determine the prevalence of these spam invitations received by radiology trainees.
    METHODS: The designed survey for evaluating the experience of radiology trainees regarding phishing scams of predatory publications and conferences was sent to radiology residency and neuroradiology fellowship program leadership to redistribute amongst their trainees, and was advertised on social media platforms. The survey was first sent out on September 28, 2023, and was closed two weeks later October 12, 2023. Spearman\'s correlation, univariable and multivariable linear regression analyses were performed.
    RESULTS: Our study included 151 respondents who completed the survey. Of the survey respondents, 53 % reported receiving unsolicited emails from predatory publications (mean = 6.76 ± 7.29), and 32 % reported receiving emails from fraudulent conferences (mean = 5.61 ± 5.77). Significant positive correlation was observed between number of unsolicited email invitations with number of PubMed indexed publications, number as corresponding author, number in open access journals and number of abstract presentations.
    CONCLUSIONS: Trainees in radiology receive many unsolicited invitations to publish papers as well as to present at meetings that are not accredited. This could lead to wasted time and financial resources for unsuspecting trainees.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    本研究调查了网络钓鱼知识的作用,提示利用率,和决策风格有助于网络钓鱼电子邮件检测。参与者(N=145)完成了在线电子邮件分类任务,以及网络钓鱼知识的衡量标准,电子邮件决策风格,提示利用率,电子邮件安全意识。线索利用率是唯一预测将网络钓鱼与真实电子邮件区分开的能力的唯一因素。网络钓鱼知识与更大的网络钓鱼检测以及将所有电子邮件分类为网络钓鱼的偏见相关联。对直观决策的偏好预测了对网络钓鱼电子邮件的较低检测,受到将电子邮件分类为真实电子邮件的更大趋势的驱动。这些发现支持这样的主张,即线索利用是一个独特的认知过程,可以实现专家的表现。结果表明,除了增加网络钓鱼知识和发展安全的行为模式,反网络钓鱼培训需要为学员提供发展有意义的线索协会的机会。
    This study investigated the roles of phishing knowledge, cue utilization, and decision styles in contributing to phishing email detection. Participants (N = 145) completed an online email sorting task, and measures of phishing knowledge, email decision styles, cue utilization, and email security awareness. Cue utilization was the only factor that uniquely predicted the capacity to discriminate phishing from genuine emails. Phishing knowledge was associated with greater phishing detection and a bias towards classifying all emails as phishing. A preference for intuitive decision making predicted lower detection of phishing emails, driven by a greater tendency to classify emails as genuine. These findings support the proposition that cue utilization is a distinct cognitive process that enables expert performance. The outcomes indicate that, in addition to increasing phishing knowledge and developing safe behavioral patterns, anti-phishing training needs to provide opportunities for trainees to develop meaningful cue associations.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    虽然新冠肺炎疫情的第二波让世界步履蹒跚,过去几个月也导致了新一轮的网络犯罪。以下文章分析了与大流行相关的网络犯罪的背景和表现,并展示了我们的刑法系统如何能够应对冠状病毒时代的当前挑战。
    While the second wave of the Covid-19 pandemic is keeping the world on tenterhooks, the last few months have also led to a new wave of cybercrime. The following article analyzes the background and manifestations of pandemic-related cybercrimes and shows how our criminal law systems are able to deal with current challenges in the age of the coronavirus.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    恶意统一资源定位符(URL)在网络攻击中普遍存在,特别是在旨在窃取敏感信息或分发恶意软件的网络钓鱼尝试中。因此,准确检测恶意URL至关重要。之前的研究已经探索了使用深度学习模型来识别恶意URL,使用将URL字符串分段为字符级或单词级令牌,嵌入和使用训练好的模型来区分URL。在这项研究中,设计了基于变压器(BERT)模型的双向编码器表示来标记URL字符串,利用其自我注意机制来增强对令牌之间相关性的理解。随后,分类器被用来确定给定的URL是否是恶意的。在评估提出的方法时,使用了三种不同类型的公共数据集:仅由Kaggle的URL字符串组成的数据集,仅包含来自GitHub的URL功能的数据集,和一个数据集,包括来自新不伦瑞克省大学的两种类型的数据,即,ISCX2016。该系统的准确率达到98.78%,96.71%,在三个数据集上为99.98%,分别。此外,在来自不同域的两个数据集上进行了实验-物联网(IoT)和基于HTTPS的域名系统(DoH)-以证明所提出模型的多功能性。
    Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. In this study, a bidirectional encoder representation from a transformers-based (BERT) model was devised to tokenize URL strings, employing its self-attention mechanism to enhance the understanding of correlations among tokens. Subsequently, a classifier was employed to determine whether a given URL was malicious. In evaluating the proposed methods, three different types of public datasets were utilized: a dataset consisting solely of URL strings from Kaggle, a dataset containing only URL features from GitHub, and a dataset including both types of data from the University of New Brunswick, namely, ISCX 2016. The proposed system achieved accuracy rates of 98.78%, 96.71%, and 99.98% on the three datasets, respectively. Additionally, experiments were conducted on two datasets from different domains-the Internet of Things (IoT) and Domain Name System over HTTPS (DoH)-to demonstrate the versatility of the proposed model.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    网络安全已经看到越来越频繁的网络攻击和受保护的健康信息(PHI)的暴露和影响。采用电子病历(EMR),物联网(IoT)设备的指数级采用,COVID-19大流行的影响增加了医疗保健部门网络攻击的威胁表面。在医疗保健领域,更具体地说,在麻醉和重症监护中,每天在几乎每位患者的护理中使用的有线和无线设备激增-医疗物联网(IoMT);呼吸机,麻醉机,输液泵,起搏装置,器官支持和过多的监测方式。所有这些设备,一旦连接到医院网络,为恶意政党提供了另一个进入医院系统的机会,要么获得PHI的财务,政治或其他利益,或直接攻击系统以导致错误的监控,更改任何设备的设置,甚至通过此IoMT窗口访问EMR。IoMT的这种指数增长以及麻醉和ICU设备以及可植入设备的无线连接的增加对患者安全构成了现实和当前的危险。有,同时,一直是医疗保健网络安全的长期资金不足。网络安全投资的缺乏使该行业暴露在外,随着PHI的货币化,引入技术上不安全的物联网设备,用于监控和直接患者护理,医疗保健行业正面临进一步毁灭性的网络攻击或PHI的违规行为。再加上COVID-19大流行给医疗保健和许多护理人员工作模式的变化带来的巨大压力,这进一步扩大了该部门遭受网络攻击的风险。
    Cybersecurity has seen an increasing frequency and impact of cyberattacks and exposure of Protected Health Information (PHI). The uptake of an Electronic Medical Record (EMR), the exponential adoption of Internet of Things (IoT) devices, and the impact of the COVID-19 pandemic has increased the threat surface presented for cyberattack by the healthcare sector. Within healthcare generally and, more specifically, within anaesthesia and Intensive Care, there has been an explosion in wired and wireless devices used daily in the care of almost every patient-the Internet of Medical Things (IoMT); ventilators, anaesthetic machines, infusion pumps, pacing devices, organ support and a plethora of monitoring modalities. All of these devices, once connected to a hospital network, present another opportunity for a malevolent party to access the hospital systems, either to gain PHI for financial, political or other gain or to attack the systems directly to cause erroneous monitoring, altered settings of any device and even to access the EMR via this IoMT window. This exponential increase in the IoMT and the increasing wireless connectivity of anaesthesia and ICU devices as well as implantable devices presents a real and present danger to patient safety. There has, at the same time, been a chronic underfunding of cybersecurity in healthcare. This lack of cybersecurity investment has left the sector exposed, and with the monetisation of PHI, the introduction of technically unsecure IoT devices for monitoring and direct patient care, the healthcare sector is presenting itself for further devastating cyberattacks or breaches of PHI. Coupled with the immense strain that the COVID-19 pandemic has placed on healthcare and the changes in working patterns of many caregivers, this has further amplified the exposure of the sector to cyberattacks.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    要设计针对电子邮件网络钓鱼的预防政策措施,了解当前应用的网络钓鱼方案和趋势是有帮助的。网络钓鱼方案和模式如何出现和适应是一个正在进行的研究领域。现有的网络钓鱼作品已经揭示了一套丰富的网络钓鱼方案,模式,以及提供对所用机制的洞察的趋势。然而,关于电子邮件网络钓鱼在社交干扰期间如何受到影响的知识似乎有限,例如COVID-19,其中网络钓鱼数量翻了两番。因此,我们调查了COVID-19大流行如何影响大流行第一年发送的网络钓鱼电子邮件。电子邮件内容(标题数据和html正文,不包括.附件)进行评估,以评估大流行随着时间的推移如何影响网络钓鱼电子邮件的主题(峰值和趋势),电子邮件活动是否与COVID-19大流行的重大事件和趋势相关,以及隐藏的内容揭示了什么。这是通过对在大流行开始期间收集的针对荷兰注册顶级域名的500.000网络钓鱼电子邮件的主体进行深入分析来研究的。研究表明,大多数与COVID-19相关的网络钓鱼电子邮件都遵循已知的模式,表明肇事者更有可能适应,而不是重塑他们的计划。
    To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phishing works already reveal a rich set of phishing schemes, patterns, and trends that provide insight into the mechanisms used. However, there seems to be limited knowledge about how email phishing is affected in periods of social disturbance, such as COVID-19 in which phishing numbers have quadrupled. Therefore, we investigate how the COVID-19 pandemic influences the phishing emails sent during the first year of the pandemic. The email content (header data and html body, excl. attachments) is evaluated to assess how the pandemic influences the topics of phishing emails over time (peaks and trends), whether email campaigns correlate with momentous events and trends of the COVID-19 pandemic, and what hidden content revealed. This is studied through an in-depth analysis of the body of 500.000 phishing emails addressed to Dutch registered top-level domains collected during the start of the pandemic. The study reveals that most COVID-19 related phishing emails follow known patterns indicating that perpetrators are more likely to adapt than to reinvent their schemes.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    视频会议应用程序Zoom中的与会者后统一资源定位器(URL)功能通常被数字取证专家忽视,认为这是恶意软件传输的潜在风险。然而,能够将网络研讨会参与者重定向到主持人为网络研讨会设置的任何URL,与会者后的URL可能会被不良行为者滥用,以使网络研讨会参与者暴露于恶意网站,或者,在最坏的情况下,强制参与者通过使用直接下载链接URL下载文件。本研究旨在展示如何通过创建一个实验环境来复制此漏洞,该环境涉及四个运行Zoom版本5.7.5的Windows10桌面,并创建一个网络研讨会,其中四个用户帐户充当网络研讨会参与者,并将与会者后URL值设置为包含键盘记录程序的网站的URL。在另一个审判中,利用了相同的实验环境,唯一的区别是设置为将网络研讨会参与者重定向到的下载链接的与会者后URL。jpg文件。在这两种情况下,通过单击在注册网络研讨会后通过电子邮件发送到每个用户帐户的邀请链接加入网络研讨会的每个用户帐户都会重定向到与会者后URL,而不管其用户帐户角色如何。这些结果不仅证明了与会者后URL可以被利用,而且还提供了如何防止这种类型的攻击的见解。
    The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    在当今依赖电子邮件的世界中,网络犯罪分子经常使用各种社会工程技术和特制的恶意电子邮件瞄准组织。当成功时,此类攻击可能会对物理和数字系统及资产造成重大损害,敏感信息的泄露,名誉受损,和财务损失。尽管关于检测网络钓鱼攻击和电子邮件中的恶意链接的研究很多,没有解决方案能够有效地,快,并准确应对更复杂的基于电子邮件的攻击,例如恶意电子邮件附件。本文提出了第一个完全自动化的恶意电子邮件检测框架,该框架使用深度集成学习来分析所有电子邮件段(正文、标头,和附件);这消除了对特征工程的人类专家干预的需要。在本文中,我们还演示了深度学习分类器的集成框架,每个分类器都在电子邮件的特定部分进行训练(从而独立利用整个电子邮件)可以比流行的电子邮件分析方法更好地概括,这些方法仅分析电子邮件的特定部分进行分析。对所提出的框架进行了全面评估,AUC为0.993,所提出的框架的结果超过了最先进的恶意电子邮件检测方法,包括基于人类专家特征的机器学习模型,TPR为5%。
    In today\'s email dependent world, cyber criminals often target organizations using a variety of social engineering techniques and specially crafted malicious emails. When successful, such attacks can result in significant harm to physical and digital systems and assets, the leakage of sensitive information, reputation damage, and financial loss. Despite the plethora of studies on the detection of phishing attacks and malicious links in emails, there are no solutions capable of effectively, quickly, and accurately coping with more complex email-based attacks, such as malicious email attachments. This paper presents the first fully automated malicious email detection framework using deep ensemble learning to analyze all email segments (body, header, and attachments); this eliminates the need for human expert intervention for feature engineering. In this paper, we also demonstrate how an ensemble framework of deep learning classifiers each of which are trained on specific portions of an email (thereby independently utilizing the entire email) can generalize better than popular email analysis methods that analyze just a specific portion of the email for analysis. The proposed framework is evaluated comprehensively and with an AUC of 0.993, the proposed framework\'s results surpass state-of-the-art malicious email detection methods, including human expert feature-based machine learning models by a TPR of 5%.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    这项研究旨在检查线索利用的作用,网络钓鱼功能和网络钓鱼邮件检测的时间压力。在两个实验中,参与者完成了包含网络钓鱼和正版电子邮件的电子邮件分类任务。参与者被分配到高或低时间压力条件。通过检测灵敏度和响应偏差评估性能。参与者被分类为提示利用率较高或较低,并完成了网络钓鱼知识的测量。当参与者对研究的性质视而不见时(N=191),提示利用率较高的参与者能够更好地区分网络钓鱼和真实电子邮件.然而,他们还记录了将电子邮件分类为网络钓鱼的更强偏见,与线索利用率较低的参与者相比。当在电子邮件分类任务(N=191)之前通知网络钓鱼基本速率时,提示利用率较高的参与者能够更好地将网络钓鱼与真正的电子邮件区分开来,而不会记录误报率的增加,与线索利用率较低的参与者相比。灵敏度随着时间压力的降低而增加,而响应偏差受每封邮件中与网络钓鱼相关的特征数量的影响。结果支持这样的主张,即基于线索的关键特征处理与个人将网络钓鱼与真实电子邮件区分开来的能力的增加有关。超越与网络钓鱼相关的知识。从应用的角度来看,这些结果表明,基于提示的训练可能有助于提高网络钓鱼邮件的检测效果.
    This study was designed to examine the roles of cue utilization, phishing features and time pressure in the detection of phishing emails. During two experiments, participants completed an email sorting task containing both phishing and genuine emails. Participants were allocated to either a high or low time pressure condition. Performance was assessed via detection sensitivity and response bias. Participants were classified with either higher or lower cue utilization and completed a measure of phishing knowledge. When participants were blind to the nature of the study (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails. However, they also recorded a stronger bias towards classifying emails as phishing, compared to participants with lower cue utilization. When notified of phishing base rates prior to the email sorting task (N = 191), participants with higher cue utilization were better able to discriminate phishing from genuine emails without recording an increase in rate of false alarms, compared to participants with lower cue utilization. Sensitivity increased with a reduction in time pressure, while response bias was influenced by the number of phishing-related features in each email. The outcomes support the proposition that cue-based processing of critical features is associated with an increase in the capacity of individuals to discriminate phishing from genuine emails, above and beyond phishing-related knowledge. From an applied perspective, these outcomes suggest that cue-based training may be beneficial for improving detection of phishing emails.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

公众号