Spear Phishing: Diagnosing Attack Paradigm

被引:0
|
作者
Pande, Deepali N. [1 ]
Voditel, Preeti S. [1 ]
机构
[1] Shri Ramdeobaba Coll Engn & Management, Dept Comp Applicat, Nagpur, MS, India
关键词
Phishing; spear-phishing; pattern mining; classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet is a rich source of web media and social networking applications. A cluster of users interconnect using those forming mutligroups. But the usage of web resources imprudently is causing doors to phishing, pharming and targeted phishing attacks. Careless use of social networking applications like LinkedIn, pinterest, whatsapp, face book and twitter barely from smart phones have become extrinsic sources for phishing and pharming attacks. Hence, it is essential to understand the pinholes of these attacks and their relationship with variants of user-agents on distributed platform. In this paper, we direct our survey in finding extrinsic porches influential to nasty invasions as attack entry point analysis. Also, we incline our detection considering recursive NM cache poisoning as the source of spear-phish attack. We present a detail analysis to determine spear-phishing. We evaluate and compare the spear phish feature detection attributes with PhishTank, a benchmark dataset.
引用
收藏
页码:2720 / 2724
页数:5
相关论文
共 50 条
  • [21] A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence
    Stembert, Nathalie
    Padmos, Arne
    Bargh, Mortaza S.
    Choenni, Sunil
    Jansen, Frans
    2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 113 - 120
  • [22] Optimal Personalized Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 958 - 964
  • [23] Analyzing Social and Stylometric Features to Identify Spear phishing Emails
    Dewan, Prateek
    Kashyap, Anand
    Kumaraguru, Ponnurangam
    PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,
  • [24] EVALUATING USER VULNERABILITIES VS PHISHER SKILLS IN SPEAR PHISHING
    Nicho, Mathew
    Fakhry, Hussein
    Egbue, Uche
    IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 13 (02): : 93 - 108
  • [25] Training Future Cybersecurity Professionals in Spear Phishing using SiEVE
    Meyers, Jared James
    Hansen, Derek L.
    Giboney, Justin S.
    Rowe, Dale C.
    SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 135 - 140
  • [26] Efficient Spear-phishing Threat Detection Using Hypervisor Monitor
    Lin, Chih-Hung
    Tien, Chin-Wei
    Chen, Chih-Wei
    Tien, Chia-Wei
    Pao, Hsing-Kuo
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 299 - 303
  • [27] Mobile Phishing Attack for Android Platform
    Abura'ed, Nour
    Otrok, Hadi
    Mizouni, Rabeb
    Bentahar, Jamal
    2014 10TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2014, : 18 - 23
  • [28] Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks
    Martin, Jaclyn
    Dube, Chad
    Coovert, Michael D.
    HUMAN FACTORS, 2018, 60 (08) : 1179 - 1191
  • [29] Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement
    Ling, Zhiting
    Feng, Huamin
    Ding, Xiong
    Wang, Xuren
    Gao, Chang
    Yang, Peian
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 522 - 538
  • [30] Study of Student Personality Trait on Spear-Phishing Susceptibility Behavior
    Alhaddad, Mohamad
    Mohd, Masnizah
    Qamar, Faizan
    Imam, Mohsin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 667 - 678