Enterprise Credential Spear-phishing attack detection

被引:18
作者
Al-Hamar, Yuosuf [1 ]
Kolivand, Hoshang [1 ,2 ]
Tajdini, Mostafa [2 ]
Saba, Tanzila [3 ]
Ramachandran, Varatharajan [4 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 3AF, Merseyside, England
[2] Staffordshire Univ, Stoke On Trent, Staffs, England
[3] Prince Sultan Univ, Informat Syst Dept, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[4] Bharath Univ Chennai, Chennai, Tamil Nadu, India
关键词
Spear-phishing; Phishing attacks; Phishing detection; Anti-phishing;
D O I
10.1016/j.compeleceng.2021.107363
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The latest report by Kaspersky on email Spam and targeted Phishing attacks, by percentage, highlights the need of an urgent solution. Attachment-driven Spear-phishing struggles to succeed against many email providers' malware-filtration systems, which proactively check emails for malicious software. In this paper, we provided a solution that can detect targeted Spear-phishing attacks based on required similarities in the specific domain which it has been targeted. The strategy is to figure out whether the domain is genuine or a forgery, which is to be evaluated by multi novel grading algorithms. Therefore, this research addresses targeted attacks on specific organisations by presenting a new enterprise solution. This detection system focuses on domain names, which tend to be registered domain names trusted by the victims. The results from this investigation show that this detection system has proven its ability to reduce email phishing attacks significantly.
引用
收藏
页数:13
相关论文
共 18 条
[1]   A Survey of Phishing Email Filtering Techniques [J].
Almomani, Ammar ;
Gupta, B. B. ;
Atawneh, Samer ;
Meulenberg, A. ;
Almomani, Eman .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04) :2070-2090
[2]  
Alomari E, 2014, DESIGN DEPLOYMENT US, V2
[3]  
[Anonymous], 2007, GIAC SECURITY ESSENT
[4]  
Bursztein E. E., 2013, INTERNET WIDE EFFORT
[5]  
Downs J. S., 2006, Proceedings of the second symposium on Usable privacy and security, P79, DOI DOI 10.1145/1143120.1143131
[6]  
Felten E. W., 2000, P 7 ACM C COMP COMM, P25, DOI [10.1145/352600.352606, DOI 10.1145/352600.352606]
[7]  
Halevi T., 2015, PHISHING SELFEFFICAC
[8]   Social phishing [J].
Jagatic, Tom N. ;
Johnson, Nathaniel A. ;
Jakobsson, Markus ;
Menczer, Filippo .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :94-100
[9]   Advanced social engineering attacks [J].
Krombholz, Katharina ;
Hobel, Heidelinde ;
Huber, Markus ;
Weippl, Edgar .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 :113-122
[10]  
Micro T., 2012, SPEAR PHISHINGEMAIL