Comparing Machine and Human Ability to Detect Phishing Emails

被引:0
|
作者
Park, Gilchan [1 ]
Stuart, Lauren M. [2 ]
Taylor, Julia M. [1 ,2 ]
Raskin, Victor [2 ,3 ]
机构
[1] Purdue Univ, CIT, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
[3] Purdue Univ, Linguist, W Lafayette, IN 47907 USA
关键词
human-computer collaboration; computer phishing detection; human phishing detection; maximization of human and computer cognitive capacities in collaboration; semanticalization;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper compares the results of computer and human efforts to determine whether an email is legitimate or a phishing attempt. For this purpose, we have run two series of experiments, one for the computer and the other for human subjects. Both experiments addressed the same corpora, one of phishing emails, and the other of legitimate ones. Both the computer and human subjects were asked to detect which emails were phishing and which were legitimate. The results are interesting, both separately and in comparison. Even at this limited, non-semantic state of computation, they indicate that human and computer competences should complement each other, and that, of course, will lead to the integration of human-accessible semantics into computation.
引用
收藏
页码:2322 / 2327
页数:6
相关论文
共 50 条
  • [31] ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS
    Ghafir, Ibrahim
    Prenosil, Vaclav
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 34 - 41
  • [32] An Evaluation of User Awareness for the Detection of Phishing Emails
    Alwanain, Mohammed I.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 323 - 328
  • [33] Blocking Foxy Phishing Emails with Historical Information
    Wu, Yongdong
    Zhao, Zhigang
    Qiu, Ying
    Bao, Feng
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [34] Profiling Phishing Emails Based on Hyperlink Information
    Yearwood, John
    Mammadov, Musa
    Banerjee, Arunava
    2010 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2010), 2010, : 120 - 127
  • [35] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [36] Classifying Emails into Human vs Machine Category
    Kang, Changsung
    Shang, Hongwei
    Langlois, Jean-Marc
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 7069 - 7077
  • [37] Detecting Spear-phishing Emails Based on Authentication
    Wang Xiujuan
    Zhang Chenxi
    Zheng Kangfeng
    Tang Haoyang
    Tao Yuanrui
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 450 - 456
  • [38] Phishing Emails Detection Using CS-SVM
    Niu, Weina
    Zhang, Xiaosong
    Yang, Guowu
    Ma, Zhiyuan
    Zhuo, Zhongliu
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1054 - 1059
  • [39] A Sender-Centric Approach to Detecting Phishing Emails
    Sanchez, Fernando
    Duan, Zhenhai
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 32 - 39
  • [40] CULTURAL COMPARISON TOWARDS USERS' SUSCEPTIBLE TO PHISHING EMAILS
    Alseadoon, Ibrahim Mohammed
    Othman, Mohd Fairuz Iskandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 240 - 244