2017 3rd IEEE International Conference on Cybernetics (CYBCONF) 2017
DOI: 10.1109/cybconf.2017.7985810
|View full text |Cite
|
Sign up to set email alerts
|

Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model

Abstract: -The prevalence and effectiveness of phishing attacks, despite the presence of a vast array of technical defences, are due largely to the fact that attackers are ruthlessly targeting what is often referred to as the weakest link in the system -the human. This paper reports the results of an investigation into how end users behave when faced with phishing websites and how this behaviour exposes them to attack. Specifically, the paper presents a proof of concept computer model for simulating human behaviour with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 9 publications
0
4
0
1
Order By: Relevance
“…As these types of attacks are now common these days, end-users must be trained with some basic knowledge about these attacks in order to avoid any loss. An model was proposed by Williams and Li [6] for evaluating the cognitive behavior of ACT-R. Based on the HTTP padlock's security indications, the authenticity of the web page is determined. Afroz and Greenstadt [7] designed a technology called "PhishZoo", in which the performance of the website before it loads is observed and then the profile of the website is also taken into the consideration while detecting the sites.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As these types of attacks are now common these days, end-users must be trained with some basic knowledge about these attacks in order to avoid any loss. An model was proposed by Williams and Li [6] for evaluating the cognitive behavior of ACT-R. Based on the HTTP padlock's security indications, the authenticity of the web page is determined. Afroz and Greenstadt [7] designed a technology called "PhishZoo", in which the performance of the website before it loads is observed and then the profile of the website is also taken into the consideration while detecting the sites.…”
Section: Literature Reviewmentioning
confidence: 99%
“…User needs to be aware of various kinds of phishing-attacks and prior knowledge is essential in identifying these webpages in real-time. Williams and Li (2017) proposed an architectural model that evaluates ACT-R cognitive behavior. This is carried out by analyzing the authenticity of webpages based on the HTTP padlock security indicator.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Detecting and blocking a phishing attack is extremely important to preserve the security and confidentiality of an individual over the internet. Researches have come up with various approaches (Armano et al 2016;Hu et al 2016;Ma et al 2009;Roy et al 2013;Sahingoz et al 2019;Williams and Li 2017) to solve this prominent problem. However, they fail in some way to be easily used by every individual.…”
Section: Introductionmentioning
confidence: 99%
“…Architectures, such as ACT-R [Anderson et al, 2004] and SOAR [Laird et al, 1987], have long been a part of HCI research to simulate users interacting with an interface. For example, ACT-R models are used for usability testing of menus [Byrne, 2001], modeling how users detect phishing websites [Williams and Li, 2017], and detecting situations with high cognitive load when using a smartphone [Wirzberger and Russwinkel, 2015]. Cognitive architectures have been used with physiological data, such as eye tracking information and fMRI, to map observed behavior the underlying mental states and brain regions [Tamborello andByrne, 2007, Borst andAnderson, 2015].…”
Section: Zzz ?!?mentioning
confidence: 99%