Phishing attacks modifications and evolutions

4Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

So-called “phishing attacks” are attacks in which phishing sites are disguised as legitimate websites in order to steal sensitive information. Our previous research [1] showed that phishing attacks tend to be relaunched many times, after sometimes small modifications. In this paper, we look into the details of these modifications and their evolution over time. We propose a model called the “Semi-Complete Linkage” (SCL) graph to perform our evaluation, and we show that unlike usual software, phishing attacks tend to be derived from a small set of master versions, and even the most active attacks in our database only go through a couple of iterations on average over their lifespan. We also show that phishing attacks tend to evolve independently from one another, without much cross-coordination.

Cite

CITATION STYLE

APA

Cui, Q., Jourdan, G. V., Bochmann, G. V., Onut, I. V., & Flood, J. (2018). Phishing attacks modifications and evolutions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11098 LNCS, pp. 243–262). Springer Verlag. https://doi.org/10.1007/978-3-319-99073-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free