Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

被引:34
|
作者
Rajivan, Prashanth [1 ]
Gonzalez, Cleotilde [1 ]
机构
[1] Carnegie Mellon Univ, Dynam Decis Making Lab, Social & Decis Sci, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2018年 / 9卷
关键词
phishing; adversarial behavior; strategy; deception; creativity; persuasion; simulation; VULNERABILITY; PREFERENCE; DECISIONS; PEOPLE;
D O I
10.3389/fpsyg.2018.00135
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [21] Raze to the Ground: Query-Efficient Adversarial HTML']HTML Attacks on Machine-Learning Phishing Webpage Detectors
    Montaruli, Biagio
    Demetrio, Luca
    Pintor, Maura
    Compagna, Luca
    Balzarotti, Davide
    Biggio, Battista
    PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 233 - 244
  • [22] A STUDY ON THE TRANSFERABILITY OF ADVERSARIAL ATTACKS IN SOUND EVENT CLASSIFICATION
    Subramanian, Vinod
    Pankajakshan, Arjun
    Benetos, Emmanouil
    Xu, Ning
    McDonald, SKoT
    Sandler, Mark
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 301 - 305
  • [23] Adversarial Attacks Against Face Recognition: A Comprehensive Study
    Vakhshiteh, Fatemeh
    Nickabadi, Ahmad
    Ramachandra, Raghavendra
    IEEE ACCESS, 2021, 9 : 92735 - 92756
  • [24] A Study of Adversarial Attacks on Malaria Cell Image Classification
    Pervin, Tasnim
    Huq, Aminul
    2021 IEEE INTERNATIONAL WOMEN IN ENGINEERING (WIE) CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE), 2022, : 79 - 82
  • [25] What Drives Creative Crowdsourcing? An Exploratory Study on the Persuasion of Digital Storytelling
    Xiao, Wei
    Wang, Xiaoling
    Xia, Senmao
    Jones, Paul
    SCIENCE TECHNOLOGY AND SOCIETY, 2022, 27 (01) : 23 - 45
  • [26] Credulity to Phishing Attacks: A Real-World Study of Personnel with Higher Education
    Rastenis, Justinas
    Ramanauskaite, Simona
    Janulevicius, Justinas
    Cenys, Antanas
    2019 OPEN CONFERENCE OF ELECTRICAL, ELECTRONIC AND INFORMATION SCIENCES (ESTREAM), 2019,
  • [27] Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement Learning
    Wang, Feng
    Zhong, Chen
    Gursoy, M. Cenk
    Velipasalar, Senem
    2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 336 - 341
  • [28] Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
    Tharani, J. Samantha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [29] Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning
    Yuan, Ying
    Apruzzese, Giovanni
    Conti, Mauro
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (02):
  • [30] Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies
    Wang, Feng
    Gursoy, M. Cenk
    Velipasalar, Senem
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 49 - 63