Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

被引:34
|
作者
Rajivan, Prashanth [1 ]
Gonzalez, Cleotilde [1 ]
机构
[1] Carnegie Mellon Univ, Dynam Decis Making Lab, Social & Decis Sci, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2018年 / 9卷
关键词
phishing; adversarial behavior; strategy; deception; creativity; persuasion; simulation; VULNERABILITY; PREFERENCE; DECISIONS; PEOPLE;
D O I
10.3389/fpsyg.2018.00135
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [1] Uncovering phishing attacks using principles of persuasion analysis
    Bustio-Martínez L.
    Herrera-Semenets V.
    García-Mendoza J.L.
    Álvarez-Carmona M.Á.
    González-Ordiano J.Á.
    Zúñiga-Morales L.
    Quiróz-Ibarra J.E.
    Santander-Molina P.A.
    van den Berg J.
    Journal of Network and Computer Applications, 2024, 230
  • [2] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101
  • [3] Directed adversarial sampling attacks on phishing detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Chuck
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (01) : 1 - 23
  • [4] Why phishing still works: User strategies for combating phishing attacks
    Alsharnouby, Mohamed
    Alaca, Furkan
    Chiasson, Sonia
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 : 69 - 82
  • [5] Understanding User Behaviors When Phishing Attacks Occur
    Li, Yi
    Xiong, Kaiqi
    Li, Xiangyang
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 222 - 222
  • [6] Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
    Xu, Tianhao
    Singh, Kuldeep
    Rajivan, Prashanth
    APPLIED ERGONOMICS, 2023, 108
  • [7] Baiting the Hook: Exploring the Interaction of Personality and Persuasion Tactics in Email Phishing Attacks
    Lawson, Patrick A.
    Crowson, Aaron D.
    Mayhorn, Christopher B.
    PROCEEDINGS OF THE 20TH CONGRESS OF THE INTERNATIONAL ERGONOMICS ASSOCIATION (IEA 2018), VOL V: HUMAN SIMULATION AND VIRTUAL ENVIRONMENTS, WORK WITH COMPUTING SYSTEMS (WWCS), PROCESS CONTROL, 2019, 822 : 401 - 406
  • [8] Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
    Apruzzese, Giovanni
    Subrahmanian, V. S.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3753 - 3769
  • [9] Mitigation strategies against the phishing attacks: A systematic literature review
    Naqvi, Bilal
    Perova, Kseniia
    Farooq, Ali
    Makhdoom, Imran
    Oyedeji, Shola
    Porras, Jari
    COMPUTERS & SECURITY, 2023, 132
  • [10] Taxonomy and Adversarial Strategies of Random Subdomain Attacks
    Griffioen, Harm
    Doerr, Christian
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,