2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2020
DOI: 10.1109/eurospw51379.2020.00069
|View full text |Cite
|
Sign up to set email alerts
|

Don’t Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…One of the main contributions of this paper is that we demonstrate experimentally that crowdsourced phishing detection can be efficient and sustainable in large organizations. The idea of crowd-sourcing phishing detection to employees has been suggested in previous papers [25], [23]. Our contribution is that we are the first to evaluate this idea over a long period of time in the context of a real large organization.…”
Section: B Summary Of Main Findingsmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the main contributions of this paper is that we demonstrate experimentally that crowdsourced phishing detection can be efficient and sustainable in large organizations. The idea of crowd-sourcing phishing detection to employees has been suggested in previous papers [25], [23]. Our contribution is that we are the first to evaluate this idea over a long period of time in the context of a real large organization.…”
Section: B Summary Of Main Findingsmentioning
confidence: 99%
“…Prior to our work, it was not known if employees as a crowdsourcing mechanism in a closed scenario, such as a corporation that manages reported phishing in-house, works effectively with acceptable operational workload. Few recent works also suggest this concept, but do not evaluate it [25], [61].…”
Section: # Of Dangerous Actionsmentioning
confidence: 99%
See 1 more Smart Citation
“…User Studies of this literature review can viewed in the following papers: [4], [10], [13], [14], [16], [19], [23], [42]- [44]. Albladi & Weir [14] used the influence factors of users' proficiency in threat detection and developing susceptible user profiling.…”
Section: ) User Studiesmentioning
confidence: 99%
“…Phishing is a form of cyberattack that aims at obtaining the victim's sensitive information and credentials (such as social security number and bank details) or execute malicious code by deceiving the user to perform specific actions such as clicking on the embedded links, downloading, or executing the attached files. Spear-phishing and whaling [1] are dangerous because they target a specific group of people and can result in a higher phishing success rate [2,3]. The most common form of phishing is to imitate a legitimate email's visual presentation and content to make users believe that it comes from a trusted source, thus deceiving the target into performing actions that attackers desire (usually clicking an embedded link) [4].…”
Section: Introductionmentioning
confidence: 99%