Why phishing still works: User strategies for combating phishing attacks

被引:136
作者
Alsharnouby, Mohamed [1 ]
Alaca, Furkan [1 ]
Chiasson, Sonia [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing; Eye tracking; Usable security; User study;
D O I
10.1016/j.ijhcs.2015.05.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We have conducted a user study to assess whether improved browser security indicators and increased awareness of phishing have led to users' improved ability to protect themselves against such attacks. Participants were shown a series of websites and asked to identify the phishing websites. We use eye tracking to obtain objective quantitative data on which visual cues draw users' attention as they determine the legitimacy of websites. Our results show that users successfully detected only 53% of phishing websites even when primed to identify them and that they generally spend very little time gazing at security indicators compared to website content when making assessments. However, we found that gaze time on browser chrome elements does correlate to increased ability to detect phishing. Interestingly, users' general technical proficiency does not correlate with improved detection scores. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:69 / 82
页数:14
相关论文
共 46 条
[1]  
Abbasi A., 2012, Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics. Cyberspace, Border, and Immigration Securities (ISI 2012), P12, DOI 10.1109/ISI.2012.6282648
[2]  
Abielmona R, 2005, PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON VIRTUAL ENVIRONMENTS, HUMAN-COMPUTER INTERFACES AND MEASUREMENT SYSTEMS, P151
[3]  
[Anonymous], P S USABLE PRIV SEC
[4]  
[Anonymous], 2009, THESIS
[5]  
[Anonymous], P 8 USENIX SEC S
[6]  
[Anonymous], NEWTORK DISRIBUTED
[7]  
[Anonymous], BEHAV INF TECHNOL
[8]  
[Anonymous], 2007, ACM P 16 INT C WORLD, DOI [DOI 10.1198/004017007000000245, DOI 10.1145/1242572.1242660]
[9]  
[Anonymous], P C EMAIL ANT CEAS
[10]  
[Anonymous], PHISH ACT TREDNS