| Literature DB >> 29515478 |
Prashanth Rajivan1, Cleotilde Gonzalez1.
Abstract
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails.Entities:
Keywords: adversarial behavior; creativity; deception; persuasion; phishing; simulation; strategy
Year: 2018 PMID: 29515478 PMCID: PMC5826381 DOI: 10.3389/fpsyg.2018.00135
Source DB: PubMed Journal: Front Psychol ISSN: 1664-1078
Figure 1Overview of the paradigm designed to study adversarial behaviors and strategies in phishing.
Figure 2Probability of rewards for persuading end-users to respond in each trial.
List of 14 strategies presented to participant in each trial and the keyword reference.
| Present deadlines | |
| Use positive emotion (e.g., surprise, excitement) | |
| Use negative emotion (e.g., fer, panic, threat) | |
| Pretend to be a government/workplace authority | |
| Pretend to be a friend/colleague/acquaintance/relative | |
| Pretend to have shared interest (work or activity) | |
| Inform problem/failure/loss | |
| Offer deal/lottery/reward | |
| Present reminder/update/notification | |
| Sell illegal material (e.g., pornography, drugs) | |
| Present opportunity (job, product or service) | |
| Request help | |
| Offer help | |
| Other |
Figure 3Visual representation of distribution of phishing Emails to participants in Phase-2.
Figure 4Summary of all the measures used in the analyses. The two experiment variables and three behavioral measures are used to compare and predict the two outcome variables.
Figure 5Comparison of total number of times each strategy was used across all emails.
Figure 6Distribution of aggregated attacker-level performance.
Results from factorial ANOVA on total effort.
| High-value reward trial | 8 | 15775001.28 | 1971875.16 | 2.38 | 0.0325 |
| Phishing example | 9 | 8658667.26 | 962074.14 | 1.16 | 0.3436 |
| High-value reward trial:phishing example | 42 | 38847243.57 | 924934.37 | 1.12 | 0.3607 |
| Residuals | 42 | 34774959.30 | 827975.22 |
p-value < 0.05.
Figure 7Comparison of average number of edits made in subsequent trials following a high-payoff.
Results from multiple regression analysis to predict total effort.
| (Intercept) | 0.0000 | 0.0929 | 0.00 | 1.0000 |
| Fluency | 0.2105 | 0.0941 | 2.24 | 0.0276 |
| Elaboration | 0.3606 | 0.0943 | 3.82 | 0.0002 |
| Exploration | 0.1619 | 0.0940 | 1.72 | 0.0883 |
p-value < 0.05.
Results from factorial ANOVA on persuasion performance.
| High-value reward trial | 8 | 9.42 | 1.18 | 1.45 | 0.2047 |
| Phishing example | 9 | 22.09 | 2.45 | 3.03 | 0.0073 |
| High-value reward trial:phishing example | 40 | 33.26 | 0.83 | 1.03 | 0.4676 |
| Residuals | 41 | 33.24 | 0.81 |
p-value < 0.05.
Results from multiple regression analysis to predict persuasion performance.
| (Intercept) | −0.0000 | 0.0968 | −0.00 | 1.0000 |
| Fluency | 0.0161 | 0.0980 | 0.16 | 0.8696 |
| Elaboration | −0.0269 | 0.0982 | −0.27 | 0.7850 |
| Exploration | −0.3178 | 0.0979 | −3.25 | 0.0016 |
p-value < 0.05.
Figure 8Visualization of pair-wise, polychoric correlation of occurrence between 14 strategies.
Beta estimates for 11 strategies from mixed-effects regression analysis to predict aggregated phishing outcome.
| Offer a deal | −1.8 | 0.4 | −4.53 | <0.05 |
| Sell illegal material | −3.02 | 1.13 | −2.66 | <0.05 |
| Use positive-tone | −1.02 | 0.39 | −2.64 | <0.05 |
| Use deadline | −0.27 | 0.37 | −0.6 | >0.1 |
| Offer help | 0.02 | 0.35 | 0.06 | >0.1 |
| Request help | 0.35 | 0.41 | 0.82 | >0.1 |
| Sound like an authority | 0.71 | 0.39 | 1.8 | <0.05 |
| Send notification | 0.82 | 0.37 | 2.2 | <0.05 |
| Sound like a friend | 0.9 | 0.43 | 2.1 | <0.05 |
| Express shared interest | 1.02 | 0.46 | 2.2 | <0.05 |
| Communicate failure | 1.05 | 0.38 | 2.8 | <0.05 |
p-value < 0.05.
Excerpt of example emails for both *successful and †unsuccessful strategies.
| Offer a deal† | |
| Sell illegal material† | |
| Sound like a friend* | |
| Sound authoritative* | |
| Shared interest* |
Computing Levenshtein edit distance