Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

被引:34
|
作者
Rajivan, Prashanth [1 ]
Gonzalez, Cleotilde [1 ]
机构
[1] Carnegie Mellon Univ, Dynam Decis Making Lab, Social & Decis Sci, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2018年 / 9卷
关键词
phishing; adversarial behavior; strategy; deception; creativity; persuasion; simulation; VULNERABILITY; PREFERENCE; DECISIONS; PEOPLE;
D O I
10.3389/fpsyg.2018.00135
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [31] Deep learning in image reconstruction: vulnerability under adversarial attacks and potential defense strategies
    Zhang, Chengzhu
    Li, Yinsheng
    Chen, Guang-Hong
    MEDICAL IMAGING 2021: PHYSICS OF MEDICAL IMAGING, 2021, 11595
  • [32] Uncovering Distortion Differences: A Study of Adversarial Attacks and Machine Discriminability
    Wang, Xiawei
    Li, Yao
    Hsieh, Cho-Jui
    Lee, Thomas C. M.
    IEEE ACCESS, 2024, 12 : 117872 - 117883
  • [33] Graph Adversarial Attacks and Defense: An Empirical Study on Citation Graph
    Chau Pham
    Vung Pham
    Dang, Tommy
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2553 - 2562
  • [34] Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
    Alotaibi, Afnan
    Rassam, Murad A.
    FUTURE INTERNET, 2023, 15 (02)
  • [35] Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study
    Joshi, Kunj
    Bhatt, Chintan
    Shah, Kaushal
    Parmar, Dwireph
    Corchado, Juan M.
    Bruno, Alessandro
    Mazzeo, Pier Luigi
    ALGORITHMS, 2023, 16 (08)
  • [36] Do Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing Attacks
    Neupane, Ajaya
    Satvat, Kiavash
    Saxena, Nitesh
    Stavrinos, Despina
    Bishop, Haley Johnson
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 467 - 477
  • [37] Covert Attacks Through Adversarial Learning: Study of Lane Keeping Attacks on the Safety of Autonomous Vehicles
    Farivar, Faezeh
    Haghighi, Mohammad Sayad
    Jolfaei, Alireza
    Wen, Sheng
    IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2021, 26 (03) : 1350 - 1357
  • [38] Study of pragmatic transfer in persuasion strategies by Chinese learners of English
    Bu, Jiemin
    3L-LANGUAGE LINGUISTICS LITERATURE-THE SOUTHEAST ASIAN JOURNAL OF ENGLISH LANGUAGE STUDIES, 2010, 16 (02): : 93 - 114
  • [39] Creative strategies employed in modelling: A case study
    Bailer-Jones D.M.
    Foundations of Science, 1999, 4 (4) : 375 - 388
  • [40] Adversarial attacks and defenses in person search: A systematic mapping study and taxonomy
    Andrade, Eduardo de O.
    Guerin, Joris
    Viterbo, Jose
    Sampaio, Igor Garcia Ballhausen
    IMAGE AND VISION COMPUTING, 2024, 148