2018
DOI: 10.3389/fpsyg.2018.00135
|View full text |Cite
|
Sign up to set email alerts
|

Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

Abstract: Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(40 citation statements)
references
References 53 publications
0
39
0
Order By: Relevance
“…The psychology of end-users, the subjects to be trained to achieve higher phishingawareness, and attackers should be considered when devising effective anti-phishing training programs [142,143].…”
Section: Psychological Aspects Of Training Designmentioning
confidence: 99%
See 1 more Smart Citation
“…The psychology of end-users, the subjects to be trained to achieve higher phishingawareness, and attackers should be considered when devising effective anti-phishing training programs [142,143].…”
Section: Psychological Aspects Of Training Designmentioning
confidence: 99%
“…Regarding the attackers, a better understanding of the psychology of attackers is crucial in modeling adversary behavior and identifying the implicit factors that determine how deception and phishing strategies are employed in phishing emails in the first place [74,144]. Currently, the psychology of criminal behaviors is usually neglected in the field of cybersecurity [143]. Nevertheless, target-adversary interactions and how they are driven as part of adversary strategies are important in facilitating realistic phishing simulations and, consequently, training tools.…”
Section: Psychological Aspects Of Training Designmentioning
confidence: 99%
“…Furthermore, high workload might cause unintended noncompliance behavior-high volumes of work could make one click on a phishing link because an overworked employee could have been too occupied to notice the imposed threats [15]. This is especially concerning given that cyberattacks today are extremely hard to detect because they have become extremely intricate; they are targeted attacks that have been carefully planned according to each organization's needs [67]. Tactics such as social engineering-the act of psychologically manipulating people into revealing personal information or allowing access to a secured server-have been increasingly successful in phishing [68].…”
Section: Principal Findingsmentioning
confidence: 99%
“…In the most direct version of this approach, the experimenter tries to phish people in the lab, for example by having them browse real and phishing websites to see whether or not they divulge sensitive information (Gavett et al, 2017). Other lab-based experiments involve roleplaying another person checking their emails (Downs, Holbrook, & Cranor, 2007;Sheng, Holbrook, Kumaraguru, Cranor, & Downs, 2010) or rating a series of emails according to how suspicious they appear or how likely the person would be to respond to such an email (Alsharnouby, Alaca, & Chiasson, 2015;Dhamija, Tygar, & Hearst, 2006;Jones, Towse, Race, & Harrison, 2019;Kelley & Bertenthal, 2016;Rajivan & Gonzalez, 2018;Wood, Liu, Hanoch, Xi, & Klapatch, 2018;Yan & Gozu, 2012). Despite the increased experimental control offered by these lab-based tasks, the extent to which these measures are ecologically valid remains unknown.…”
Section: Introductionmentioning
confidence: 99%