Phishing: An economic analysis of cybercrime perpetrators

被引:17
作者
Konradt, Christian [1 ]
Schilling, Andreas [2 ]
Werners, Brigitte [2 ]
机构
[1] Univ Munster, European Res Ctr Informat Syst, Informat Syst & Supply Chain Management, Leonardo Campus 3, D-48149 Munster, Germany
[2] Ruhr Univ Bochum, Fac Econ & Management, Univ Str 150, D-44780 Bochum, Germany
关键词
Cybercrime; Economic analysis; Information security; Phishing; Simulation; @Risk; SECURITY; CRIME;
D O I
10.1016/j.cose.2015.12.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrime, one of the most important security topics, will continue to emerge as a more critical security threat within the next years. Among the different attacks, phishing is of special interest because of its negative impact for the economy. In this paper, we develop a simulation study based on the work of Fultz and Grossklags. To extend their analysis of cybercrime by an economic view, we customized their model and used it as basis for our analysis. Based on the data from recent literature, our assessment gives insights into the perpetrator's behavior and allows us to quantify the effectiveness of countermeasures. Due to the fact that mainly risk-seeking persons are responsible for these attacks, countermeasures aiming at increasing the penalties are not very effective. We discovered that better control of dark markets to prevent the trading of stolen data has a much higher impact. In general, results of our simulation can be used to analyze the perpetrator's economic motives and to establish a basis for effective countermeasures. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:39 / 46
页数:8
相关论文
共 31 条
[1]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[2]  
Anderson R., 2008, Security economics and the internal market
[3]  
[Anonymous], STATEXTRACTS
[4]  
[Anonymous], COMPR STUD CYB
[5]  
Anti-Phishing Working Group (APWG), 2004, PHISH ACT TRENDS REP
[6]  
BAE Systems Detica and London Metropolitan University, 2012, ORG CRIM DIG AG
[7]   Cybersecurity: Stakeholder incentives, externalities, and policy options [J].
Bauer, Johannes M. ;
van Eeten, Michel J. G. .
TELECOMMUNICATIONS POLICY, 2009, 33 (10-11) :706-719
[8]   CRIME AND PUNISHMENT - ECONOMIC APPROACH [J].
BECKER, GS .
JOURNAL OF POLITICAL ECONOMY, 1968, 76 (02) :169-217
[9]  
Broadhurst R, 2014, INT J CYBER CRIMINOL, V8, P1
[10]   Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild [J].
Bursztein, Elie ;
Benko, Borbala ;
Margolis, Daniel ;
Pietraszek, Tadek ;
Archer, Andy ;
Aquino, Allan ;
Pitsillidis, Andreas ;
Savage, Stefan .
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14), 2014, :347-358