Spear Phishing: Diagnosing Attack Paradigm

被引:0
|
作者
Pande, Deepali N. [1 ]
Voditel, Preeti S. [1 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Dept Comp Applicat, Nagpur, MS, India
关键词
Phishing; spear-phishing; pattern mining; classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet is a rich source of web media and social networking applications. A cluster of users interconnect using those forming mutligroups. But the usage of web resources imprudently is causing doors to phishing, pharming and targeted phishing attacks. Careless use of social networking applications like LinkedIn, pinterest, whatsapp, face book and twitter barely from smart phones have become extrinsic sources for phishing and pharming attacks. Hence, it is essential to understand the pinholes of these attacks and their relationship with variants of user-agents on distributed platform. In this paper, we direct our survey in finding extrinsic porches influential to nasty invasions as attack entry point analysis. Also, we incline our detection considering recursive NM cache poisoning as the source of spear-phish attack. We present a detail analysis to determine spear-phishing. We evaluate and compare the spear phish feature detection attributes with PhishTank, a benchmark dataset.
引用
收藏
页码:2720 / 2724
页数:5
相关论文
共 50 条
  • [1] An Analysis of a New Detection Method for Spear Phishing Attack
    Chi, Yaping
    Ling, Zhiting
    Ba, Xuejing
    Li, Shuhao
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 1063 - 1072
  • [2] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [3] Statistical method for prediction of a targeted spear phishing attack
    Alok, Vijayant
    Sodhi, J. S.
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2024, 45 (07): : 1843 - 1856
  • [4] Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults
    Briddick, Curtis
    Briggs, Pam
    Nicholson, James
    INFORMATION SECURITY EDUCATION-CHALLENGES IN THE DIGITAL AGE, WISE 2024, 2024, 707 : 65 - 80
  • [5] Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
    Wang, Jingguo
    Herath, Tejaswini
    Chen, Rui
    Vishwanath, Arun
    Rao, H. Raghav
    IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2012, 55 (04) : 345 - 362
  • [6] Spear phishing in a barrel: Insights from a targeted phishing campaign
    Burns, A. J.
    Johnson, M. Eric
    Caputo, Deanna D.
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (01) : 24 - 39
  • [7] Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
    Chen, Xiayang
    Liu, Xingtong
    Zhang, Lei
    Tang, Chaojing
    IEEE ACCESS, 2019, 7 : 19907 - 19921
  • [8] ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS
    Ghafir, Ibrahim
    Prenosil, Vaclav
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 34 - 41
  • [9] Spear-phishing becoming more common
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (08) : 594 - 595
  • [10] Detecting lateral spear phishing attacks in organisations
    Bhadane, Aniket
    Mane, Sunil B.
    IET INFORMATION SECURITY, 2019, 13 (02) : 133 - 140