Statistical method for prediction of a targeted spear phishing attack

被引:0
|
作者
Alok, Vijayant [1 ]
Sodhi, J. S. [2 ]
机构
[1] Amity Univ, Amity Business Sch, Noida 201303, Uttar Pradesh, India
[2] Amity Univ, Noida 201303, Uttar Pradesh, India
来源
关键词
Bots; Botnets; Cyber Warfare; Spear Phishing; Intelligence; Active and passive reconnaissance;
D O I
10.47974/JIOS-1734
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Targeted Cyber Attacks normally are placed on the intersection of the cognitive as well as the technical domains of hybrid warfare. With a view to glean super normal information for strategic as well as tactical advantages, the cognitive factors activate the technical resources in the domain to achieve one or more objectives. The paper is intended to provide an insight and relationship between the mind-set of an attacker and the resources that he activates to fulfil his desires - why, when and from where.
引用
收藏
页码:1843 / 1856
页数:14
相关论文
共 50 条
  • [1] An Analysis of a New Detection Method for Spear Phishing Attack
    Chi, Yaping
    Ling, Zhiting
    Ba, Xuejing
    Li, Shuhao
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 1063 - 1072
  • [2] Spear Phishing: Diagnosing Attack Paradigm
    Pande, Deepali N.
    Voditel, Preeti S.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2720 - 2724
  • [3] Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
    Wang, Jingguo
    Herath, Tejaswini
    Chen, Rui
    Vishwanath, Arun
    Rao, H. Raghav
    IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2012, 55 (04) : 345 - 362
  • [4] Spear phishing in a barrel: Insights from a targeted phishing campaign
    Burns, A. J.
    Johnson, M. Eric
    Caputo, Deanna D.
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (01) : 24 - 39
  • [5] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [6] Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults
    Briddick, Curtis
    Briggs, Pam
    Nicholson, James
    INFORMATION SECURITY EDUCATION-CHALLENGES IN THE DIGITAL AGE, WISE 2024, 2024, 707 : 65 - 80
  • [7] Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
    Chen, Xiayang
    Liu, Xingtong
    Zhang, Lei
    Tang, Chaojing
    IEEE ACCESS, 2019, 7 : 19907 - 19921
  • [8] ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS
    Ghafir, Ibrahim
    Prenosil, Vaclav
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 34 - 41
  • [9] Spear-phishing becoming more common
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (08) : 594 - 595
  • [10] Detecting lateral spear phishing attacks in organisations
    Bhadane, Aniket
    Mane, Sunil B.
    IET INFORMATION SECURITY, 2019, 13 (02) : 133 - 140