Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks

被引:17
|
作者
Martin, Jaclyn [1 ]
Dube, Chad [1 ]
Coovert, Michael D. [1 ,2 ]
机构
[1] Univ S Florida, Dept Psychol, 4202 E Fowler Ave, Tampa, FL 33620 USA
[2] Univ S Florida, Tampa, FL USA
关键词
decision making; cognition; personality; signal detection theory; cybersecurity; human-computer interaction; computer systems; RECOGNITION MEMORY;
D O I
10.1177/0018720818789818
中图分类号
B84 [心理学]; C [社会科学总论]; Q98 [人类学];
学科分类号
03 ; 0303 ; 030303 ; 04 ; 0402 ;
摘要
Objective: To examine the utility of equal-variance signal detection theory (EVSDT) for evaluating and understanding human detection of phishing and spear-phishing e-mail scams. Background: Although the majority of cybersecurity breaches are due to erroneous responses to deceptive phishing e-mails, it is unclear how best to quantify performance in this context. In particular, it is unclear whether equal variances can safely be assumed in the SDT model, or, relatedly, whether degree of targeting, or threat level, primarily affects mean separation or evidence variability. Method: Through an online inbox simulation, the present research found that differences in susceptibility to phishing and spear-phishing e-mails could be carefully quantified with respect to detection accuracy and response bias through the use of an EVSDT framework. Results: The results indicated that EVSDT-based point metrics are effective for modeling and measuring phishing susceptibility in the inbox task, without the need for parameter estimation or model comparison involving unequal-variance SDT (UVSDT). Threat level modulated mean separation, with no effects on signal variances. Conclusion: These findings support the viability of using EVSDT to initially assess and subsequently monitor training effectiveness for phishing susceptibility, thereby providing measures that are superior to more intuitive metrics, which typically confound an individual's bias and accuracy. Effects of threat level mapped clearly onto distribution means with no effect on variances, suggesting phishing susceptibility primarily reflects temporally stable discriminative characteristics of observers. Notably, results indicated that people are particularly poor at identifying spear-phishing e-mail threats (demonstrating only 40% accuracy).
引用
收藏
页码:1179 / 1191
页数:13
相关论文
共 13 条
  • [1] Optimal Personalized Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 958 - 964
  • [2] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [3] The Need for New Antiphishing Measures Against Spear-Phishing Attacks
    Allodi, Luca
    Chotza, Tzouliano
    Panina, Ekaterina
    Zannone, Nicola
    IEEE SECURITY & PRIVACY, 2020, 18 (02) : 23 - 34
  • [4] Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
    Xu, Tianhao
    Singh, Kuldeep
    Rajivan, Prashanth
    APPLIED ERGONOMICS, 2023, 108
  • [5] Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
    Laszka, Aron
    Lou, Jian
    Vorobeychik, Yevgeniy
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 537 - 543
  • [6] Study of Student Personality Trait on Spear-Phishing Susceptibility Behavior
    Alhaddad, Mohamad
    Mohd, Masnizah
    Qamar, Faizan
    Imam, Mohsin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 667 - 678
  • [7] Efficient Spear-phishing Threat Detection Using Hypervisor Monitor
    Lin, Chih-Hung
    Tien, Chin-Wei
    Chen, Chih-Wei
    Tien, Chia-Wei
    Pao, Hsing-Kuo
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 299 - 303
  • [8] Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks
    Islam, Md Mazharul
    Al-Shaer, Ehab
    Rahim, Muhammad Abdul Basit Ur
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 1 - 22
  • [9] Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content
    Lin, Tian
    Capecci, Daniel E.
    Ellis, Donovan M.
    Rocha, Harold A.
    Dommaraju, Sandeep
    Oliveira, Daniela S.
    Ebner, Natalie C.
    ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2019, 26 (05)
  • [10] Detection and prevention of spear phishing attacks: A comprehensive survey
    Birthriya, Santosh Kumar
    Ahlawat, Priyanka
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2025, 151