loading
Papers

Research.Publish.Connect.

Paper

Authors: Yi Li 1 ; Kaiqi Xiong 1 and Xiangyang Li 2

Affiliations: 1 Intelligent Computer Networking and Security Lab, University of South Florida, Tampa and U.S.A. ; 2 Johns Hopkins University, Baltimore and U.S.A.

ISBN: 978-989-758-378-0

Keyword(s): User Behaviors, Phishing Email, Machine Learning, Amazon Mechanical Turk.

Abstract: Understanding user behaviors plays an important role in security situation assessments and computer system operations. There are very challenging and limited studies on email user behaviors. To study user behaviors related with phishing emails, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. We used a set of emails including phishing emails from the real world. We collect experimental data including participants’ basic background information, time measurement, and their answers to survey questions. We first check whether or not factors such as intervention, phishing types, and incentive mechanisms play a major role in user behaviors when phishing attacks occur. We then evaluate the significance of each attribute with a performance score. The performance score is a metric demonstrating how a user makes a correct judgment on phishing while phishing attacks occur. We propose a machine learning framework, which contains attribute reduction and 10-fold cross-validation, to predict the performance of a user based on our collected data. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.189.171

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Li, Y.; Xiong, K. and Li, X. (2019). An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 529-534. DOI: 10.5220/0008119805290534

@conference{secrypt19,
author={Yi Li. and Kaiqi Xiong. and Xiangyang Li.},
title={An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={529-534},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008119805290534},
isbn={978-989-758-378-0},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
SN - 978-989-758-378-0
AU - Li, Y.
AU - Xiong, K.
AU - Li, X.
PY - 2019
SP - 529
EP - 534
DO - 10.5220/0008119805290534

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.