Don't Forget the Human: A Crowdsourced Approach to Automate Response and Containment against Spear Phishing Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Abstract

Organizations are increasingly facing sophisticated social engineering attacks that exploit human vulnerabilities and overcome commonly available countermeasures. Spear-phishing campaigns are becoming the most prevalent attack and source of compromise for most organizations. We argue that existing prevention and detection countermeasures are fundamentally ineffective against this class of attacks. In this work, we propose a novel approach to address the limitations of existing countermeasures. Our proposition is a new course of action to exploit human detection capabilities as a basis of automated response strategies. Preliminary results unveil users' mental models for phishing detection and reporting as a way to improve the phishing reporting process altogether. A real word case study is provided to promote the feasibility of our proposal.

Original languageEnglish
Title of host publicationProceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020
PublisherInstitute of Electrical and Electronics Engineers
Pages471-476
Number of pages6
ISBN (Electronic)978-1-7281-8597-2
ISBN (Print)978-1-7281-8598-9
DOIs
Publication statusPublished - Sep 2020
Event5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 - Virtual, Genoa, Italy
Duration: 7 Sep 202011 Sep 2020

Conference

Conference5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020
CountryItaly
CityVirtual, Genoa
Period7/09/2011/09/20

Keywords

  • containment
  • counter-measures
  • human measurement
  • spear phishing

Fingerprint Dive into the research topics of 'Don't Forget the Human: A Crowdsourced Approach to Automate Response and Containment against Spear Phishing Attacks'. Together they form a unique fingerprint.

Cite this