Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

被引:34
|
作者
Rajivan, Prashanth [1 ]
Gonzalez, Cleotilde [1 ]
机构
[1] Carnegie Mellon Univ, Dynam Decis Making Lab, Social & Decis Sci, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2018年 / 9卷
关键词
phishing; adversarial behavior; strategy; deception; creativity; persuasion; simulation; VULNERABILITY; PREFERENCE; DECISIONS; PEOPLE;
D O I
10.3389/fpsyg.2018.00135
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [11] Phishing Attacks Over Time: A Longitudinal Study
    Yates, Dave
    Harris, Albert L.
    AMCIS 2015 PROCEEDINGS, 2015,
  • [12] Phishing attacks over time: A longitudinal study
    20161602257575
    (1) University of Denver, United States; (2) Appalachian State University, United States, 1600, (Americas Conference on Information Systems):
  • [13] Enhancing the transferability of adversarial attacks with diversified input strategies
    Li Z.
    Chen Y.
    Yang B.
    Li C.
    Zhang S.
    Li W.
    Zhang H.
    Journal of Intelligent and Fuzzy Systems, 2024, 46 (04): : 10359 - 10373
  • [14] Diversified Strategies for Mitigating Adversarial Attacks in Multiagent Systems
    Balcan, Maria-Florina
    Blum, Avrim
    Chen, Shang-Tse
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS' 18), 2018, : 407 - 415
  • [15] Optimism bias in susceptibility to phishing attacks: an empirical study
    Owen, Morne
    Flowerday, Stephen V.
    van der Schyff, Karl
    INFORMATION AND COMPUTER SECURITY, 2024, : 656 - 675
  • [16] Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
    Alkhalil, Zainab
    Hewage, Chaminda
    Nawaf, Liqaa
    Khan, Imtiaz
    FRONTIERS IN COMPUTER SCIENCE, 2021, 3
  • [17] A Study on the Optimization of the CNNs for Adversarial Attacks
    Park, Hyeongcheol
    Kim, Jongweon
    PROCEEDINGS OF 2023 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2023, 2023, : 193 - 198
  • [18] Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
    AlEroud, Ahmed
    Karabatis, George
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 53 - 60
  • [19] Adversarial Attacks on Large Language Model-Based System and Mitigating Strategies: A Case Study on ChatGPT
    Liu, Bowen
    Xiao, Boao
    Jiang, Xutong
    Cen, Siyuan
    He, Xin
    Dou, Wanchun
    Security and Communication Networks, 2023, 2023
  • [20] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538