So-called “phishing attacks” are attacks in which phishing sites are disguised as legitimate websites in order to steal sensitive information. Our previous research [1] showed that phishing attacks tend to be relaunched many times, after sometimes small modifications. In this paper, we look into the details of these modifications and their evolution over time. We propose a model called the “Semi-Complete Linkage” (SCL) graph to perform our evaluation, and we show that unlike usual software, phishing attacks tend to be derived from a small set of master versions, and even the most active attacks in our database only go through a couple of iterations on average over their lifespan. We also show that phishing attacks tend to evolve independently from one another, without much cross-coordination.
CITATION STYLE
Cui, Q., Jourdan, G. V., Bochmann, G. V., Onut, I. V., & Flood, J. (2018). Phishing attacks modifications and evolutions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11098 LNCS, pp. 243–262). Springer Verlag. https://doi.org/10.1007/978-3-319-99073-6_12
Mendeley helps you to discover research relevant for your work.