Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks

被引:3
作者
Legg, Phil [1 ]
Blackman, Tim [2 ]
机构
[1] Univ West England, Dept Comp Sci & Creat Technol, Bristol, Avon, England
[2] Univ West England, Informat Technol Serv, Bristol, Avon, England
来源
2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA) | 2019年
关键词
Cyber situational awareness; phishing; visualisation; user experience;
D O I
10.1109/cybersa.2019.8899406
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing attacks continue to be one of the most common attack vectors used online today to deceive users, such that attackers can obtain unauthorised access or steal sensitive information. Phishing campaigns often vary in their level of sophistication, from mass distribution of generic content, such as delivery notifications, online purchase orders, and claims of winning the lottery, through to bespoke and highly-personalised messages that convincingly impersonate genuine communications (e.g., spearphishing attacks). There is a distinct trade-off here between the scale of an attack versus the effort required to curate content that is likely to convince an individual to carry out an action (typically, clicking a malicious hyperlink). In this short paper, we conduct a preliminary study on a recent realworld incident that strikes a balance between attacking at scale and personalised content. We adopt different visualisation tools and techniques for better assessing the scale and impact of the attack, that can be used both by security professionals to analyse the security incident, but could also be used to inform employees as a form of security awareness and training. We pitched the approach to IT professionals working in information security, who believe this may provide improved awareness of how targeted phishing campaigns can impact an organisation, and could contribute towards a pro-active step of how analysts will examine and mitigate the impact of future attacks across the organisation.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Towards a Theoretical Framework for an Active Cyber Situational Awareness Model
    Al-Shamisi, Ahmed
    Louvieris, Panos
    Al-Mualla, Mohammed
    Mihajlov, Martin
    [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, (IWSSIP 2016), 2016, : 263 - 268
  • [32] Integrated Situational Awareness for Cyber Attack Detection, Analysis, and Mitigation
    Cheng, Yi
    Sagduyu, Yalin
    Deng, Julia
    Li, Jason
    Liu, Peng
    [J]. SENSORS AND SYSTEMS FOR SPACE APPLICATIONS V, 2012, 8385
  • [33] An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
    Mustafa, Mohd Sarifuddin bin Othman
    Kabir, Muhammad Nomani
    Ernawan, Ferda
    Jing, Wang
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND INTELLIGENT SYSTEMS (I2CACIS), 2019, : 10 - 14
  • [34] Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries
    Leitner, Maria
    Skopik, Florian
    Pahi, Timea
    [J]. INFORMATION SECURITY JOURNAL, 2024, 33 (05): : 486 - 507
  • [35] Cauldron Mission-Centric Cyber Situational Awareness with Defense in Depth
    Jajodia, Sushil
    Noel, Steven
    Kalapa, Pramod
    Albanese, Massimiliano
    Williams, John
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1339 - 1344
  • [36] Correlating Cyber Incident Information to Establish Situational Awareness in Critical Infrastructures
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [37] Mission-Centric Risk Assessment to Improve Cyber Situational Awareness
    Silva, F. R. L.
    Jacob, P.
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [38] CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
    Husak, Martin
    Sadlek, Lukas
    Spacek, Stanislav
    Lastovicka, Martin
    Javornik, Michal
    Komarkova, Jana
    [J]. COMPUTERS & SECURITY, 2022, 115
  • [39] Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
    ul Haq, Qazi Emad
    Faheem, Muhammad Hamza
    Ahmad, Iftikhar
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (22):
  • [40] Detection of Phishing Attacks with Machine Learning Techniques in Cognitive Security Architecture
    Ortiz-Garces, Ivan
    Andrade, Roberto O.
    Cazares, Maria
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 366 - 370