Statistical method for prediction of a targeted spear phishing attack

被引:0
|
作者
Alok, Vijayant [1 ]
Sodhi, J. S. [2 ]
机构
[1] Amity Univ, Amity Business Sch, Noida 201303, Uttar Pradesh, India
[2] Amity Univ, Noida 201303, Uttar Pradesh, India
来源
关键词
Bots; Botnets; Cyber Warfare; Spear Phishing; Intelligence; Active and passive reconnaissance;
D O I
10.47974/JIOS-1734
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Targeted Cyber Attacks normally are placed on the intersection of the cognitive as well as the technical domains of hybrid warfare. With a view to glean super normal information for strategic as well as tactical advantages, the cognitive factors activate the technical resources in the domain to achieve one or more objectives. The paper is intended to provide an insight and relationship between the mind-set of an attacker and the resources that he activates to fulfil his desires - why, when and from where.
引用
收藏
页码:1843 / 1856
页数:14
相关论文
共 50 条
  • [21] Spear-Phishing Susceptibility Stemming From Personality Traits
    Eftimie, Sergiu
    Moinescu, Radu
    Racuciu, Ciprian
    IEEE ACCESS, 2022, 10 : 73548 - 73561
  • [22] A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence
    Stembert, Nathalie
    Padmos, Arne
    Bargh, Mortaza S.
    Choenni, Sunil
    Jansen, Frans
    2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 113 - 120
  • [23] Optimal Personalized Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 958 - 964
  • [24] Analyzing Social and Stylometric Features to Identify Spear phishing Emails
    Dewan, Prateek
    Kashyap, Anand
    Kumaraguru, Ponnurangam
    PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,
  • [25] EVALUATING USER VULNERABILITIES VS PHISHER SKILLS IN SPEAR PHISHING
    Nicho, Mathew
    Fakhry, Hussein
    Egbue, Uche
    IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 13 (02): : 93 - 108
  • [26] Training Future Cybersecurity Professionals in Spear Phishing using SiEVE
    Meyers, Jared James
    Hansen, Derek L.
    Giboney, Justin S.
    Rowe, Dale C.
    SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 135 - 140
  • [27] Efficient Spear-phishing Threat Detection Using Hypervisor Monitor
    Lin, Chih-Hung
    Tien, Chin-Wei
    Chen, Chih-Wei
    Tien, Chia-Wei
    Pao, Hsing-Kuo
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 299 - 303
  • [28] Mobile Phishing Attack for Android Platform
    Abura'ed, Nour
    Otrok, Hadi
    Mizouni, Rabeb
    Bentahar, Jamal
    2014 10TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2014, : 18 - 23
  • [29] Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks
    Martin, Jaclyn
    Dube, Chad
    Coovert, Michael D.
    HUMAN FACTORS, 2018, 60 (08) : 1179 - 1191
  • [30] Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement
    Ling, Zhiting
    Feng, Huamin
    Ding, Xiong
    Wang, Xuren
    Gao, Chang
    Yang, Peian
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 522 - 538