Devising and Detecting Phishing Emails Using Large Language Models

被引:9
|
作者
Heiding, Fredrik [1 ,2 ]
Schneier, Bruce [3 ]
Vishwanath, Arun [4 ]
Bernstein, Jeremy [5 ]
Park, Peter S. [5 ]
机构
[1] Harvard Univ, Harvard John A Paulson Sch Engn & Appl Sci, Cambridge, MA 02138 USA
[2] KTH Royal Inst Technol, S-11428 Stockholm, Sweden
[3] Harvard Univ, Harvard Kennedy Sch, Cambridge, MA 02138 USA
[4] Avant Res Grp, Buffalo, NY 14214 USA
[5] MIT, Cambridge, MA 02139 USA
关键词
Phishing; large language models; social engineering; artificial intelligence;
D O I
10.1109/ACCESS.2024.3375882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AI programs, built using large language models, make it possible to automatically create phishing emails based on a few data points about a user. The V-Triad is a set of rules for manually designing phishing emails to exploit our cognitive heuristics and biases. In this study, we compare the performance of phishing emails created automatically by GPT-4 and manually using the V-Triad. We also combine GPT-4 with the V-Triad to assess their combined potential. A fourth group, exposed to generic phishing emails, was our control group. We use a red teaming approach by simulating attackers and emailing 112 participants recruited for the study. The control group emails received a click-through rate between 19-28%, the GPT-generated emails 30-44%, emails generated by the V-Triad 69-79%, and emails generated by GPT and the V-Triad 43-81%. Each participant was asked to explain why they pressed or did not press a link in the email. These answers often contradict each other, highlighting the importance of personal differences. Next, we used four popular large language models (GPT, Claude, PaLM, and LLaMA) to detect the intention of phishing emails and compare the results to human detection. The language models demonstrated a strong ability to detect malicious intent, even in non-obvious phishing emails. They sometimes surpassed human detection, although often being slightly less accurate than humans. Finally, we analyze of the economic aspects of AI-enabled phishing attacks, showing how large language models increase the incentives of phishing and spear phishing by reducing their costs.
引用
收藏
页码:42131 / 42146
页数:16
相关论文
共 50 条
  • [41] Using Large Language Models for Math Information Retrieval
    Mansouri, Behrooz
    Maarefdoust, Reihaneh
    PROCEEDINGS OF THE 47TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, SIGIR 2024, 2024, : 2693 - 2697
  • [42] Classifying legal interpretations using large language models
    Dugac, Gaspar
    Altwicker, Tilmann
    ARTIFICIAL INTELLIGENCE AND LAW, 2025,
  • [43] Using Large Language Models for the Interpretation of Building Regulations
    Fuchs, Stefan
    Witbrock, Michael
    Dimyadi, Johannes
    Amor, Robert
    Journal of Engineering, Project, and Production Management, 2024, 14 (04)
  • [44] Using large language models to write theses and dissertations
    O'Leary, Daniel E.
    INTELLIGENT SYSTEMS IN ACCOUNTING FINANCE & MANAGEMENT, 2023, 30 (04) : 228 - 234
  • [45] Investigating the Potential of Using Large Language Models for Scheduling
    Jobson, Deddy
    Li, Yilin
    PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON AI-POWERED SOFTWARE, AIWARE 2024, 2024, : 170 - 171
  • [46] Discovering prerequisite relations using large language models
    Aytekin, Mehmet Cem
    Saygin, Yucel
    INTERACTIVE LEARNING ENVIRONMENTS, 2025, 33 (02) : 1670 - 1688
  • [47] The Language of Creativity: Evidence from Humans and Large Language Models
    Orwig, William
    Edenbaum, Emma R.
    Greene, Joshua D.
    Schacter, Daniel L.
    JOURNAL OF CREATIVE BEHAVIOR, 2024, 58 (01) : 128 - 136
  • [48] Agile Project Management Using Large Language Models
    Dhruva, G.
    Shettigar, Ishaan
    Parthasarthy, Srikrshna
    Sapna, V. M.
    2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [49] Using large language models to create narrative events
    Bartalesi, Valentina
    Lenzi, Emanuele
    De Martino, Claudio
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [50] Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models
    Jha, Birendra
    Atre, Medha
    Rao, Ashwini
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 130 - 139