Comparing Machine and Human Ability to Detect Phishing Emails

被引:0
|
作者
Park, Gilchan [1 ]
Stuart, Lauren M. [2 ]
Taylor, Julia M. [1 ,2 ]
Raskin, Victor [2 ,3 ]
机构
[1] Purdue Univ, CIT, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[3] Purdue Univ, Linguist, W Lafayette, IN 47907 USA
关键词
human-computer collaboration; computer phishing detection; human phishing detection; maximization of human and computer cognitive capacities in collaboration; semanticalization;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper compares the results of computer and human efforts to determine whether an email is legitimate or a phishing attempt. For this purpose, we have run two series of experiments, one for the computer and the other for human subjects. Both experiments addressed the same corpora, one of phishing emails, and the other of legitimate ones. Both the computer and human subjects were asked to detect which emails were phishing and which were legitimate. The results are interesting, both separately and in comparison. Even at this limited, non-semantic state of computation, they indicate that human and computer competences should complement each other, and that, of course, will lead to the integration of human-accessible semantics into computation.
引用
收藏
页码:2322 / 2327
页数:6
相关论文
共 50 条
  • [21] Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails
    Stojnic, Tatyana
    Vatsalan, Dinusha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2021, 4 (05)
  • [22] A Novel Machine Learning Approach to Detect Phishing Websites
    Tyagi, Ishant
    Shad, Jatin
    Sharma, Shubham
    Gaur, Siddharth
    Kaur, Gagandeep
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 425 - 430
  • [23] How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
    Koehler, Daniel
    Puenter, Wenzel
    Meinel, Christoph
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 381 - 411
  • [24] Recognition of genuine and phishing emails may not be associated with response to phishing attacks
    Crgol, Alex
    Vrhovec, Simon
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1265 - 1283
  • [25] Profiling phishing activity based on hyperlinks extracted from phishing emails
    Yearwood, John
    Mammadov, Musa
    Webb, Dean
    SOCIAL NETWORK ANALYSIS AND MINING, 2012, 2 (01) : 5 - 16
  • [26] The role of cue utilization in the detection of phishing emails
    Sturman, Daniel
    Valenzuela, Chelsea
    Plate, Oliver
    Tanvir, Tazin
    Auton, Jaime C.
    Bayl-Smith, Piers
    Wiggins, Mark W.
    APPLIED ERGONOMICS, 2023, 106
  • [27] Predicting susceptibility to social influence in phishing emails
    Parsons, Kathryn
    Butavicius, Marcus
    Delfabbro, Paul
    Lillie, Meredith
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 128 : 17 - 26
  • [28] Generating Phishing Emails Using Graph Database
    Maleki, Nasim
    Ghorbani, Ali A.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 434 - 449
  • [29] The human factor in phishing: Collecting and analyzing user behavior when reading emails
    Gallo, Luigi
    Gentile, Danilo
    Ruggiero, Saverio
    Botta, Alessio
    Ventre, Giorgio
    COMPUTERS & SECURITY, 2024, 139
  • [30] Education and Training Against Threat of Phishing Emails
    Burita, Ladislav
    Klaban, Ivo
    Racil, Tomas
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 7 - 18