Categorizing human phishing difficulty: a Phish Scale

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks

In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer. This type of HIP can be used to detect phishing attacks, in which websites are spoofed in order to trick users in...

متن کامل

Phinding Phish: Evaluating Anti-Phishing Tools

There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. We developed an automated test bed for testing antiphishing tools. We used 200 verified phishing URLs from two sources and 516 legitimate URLs to test the effectiveness of 10 popular anti-phi...

متن کامل

Catching Phish: Detecting Phishing Attacks From Rendered Website Images

This paper proposes a computer vision based approach for defending against the pandemic threat of phishing, a social engineering attack on personal identity and property. Presently, many layers of defense exist, but there is no general solution. Our proposal is intended to complement existing strategies. We examine the problem of relying only on images of rendered web pages to identify phishing...

متن کامل

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. We developed an automated test bed for testing antiphishing tools. We used 200 verified phishing URLs from two sources and 516 legitimate URLs to test the effectiveness of 10 popular anti-phi...

متن کامل

Dead Phish: An Examination of Deactivated Phishing Sites

Efforts to combat phishing and fraud online often center around filtering the phishing messages and disabling phishing Web sites to prevent users from being deceived. Two potential approaches to disabling a phishing site are (1) to eliminate the required DNS records to reach the site and (2) to remove the site from the machine itself. While previous work has focused on DNS take-down efforts, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cybersecurity

سال: 2020

ISSN: 2057-2085,2057-2093

DOI: 10.1093/cybsec/tyaa009