loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Yi Li 1 ; Kaiqi Xiong 1 and Xiangyang Li 2

Affiliations: 1 Intelligent Computer Networking and Security Lab, University of South Florida, Tampa and U.S.A. ; 2 Johns Hopkins University, Baltimore and U.S.A.

Keyword(s): User Behaviors, Phishing Email, Machine Learning, Amazon Mechanical Turk.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Human Factors and Human Behaviour Recognition Techniques ; Information and Systems Security ; Information Assurance ; Security and Privacy in Social Networks

Abstract: Understanding user behaviors plays an important role in security situation assessments and computer system operations. There are very challenging and limited studies on email user behaviors. To study user behaviors related with phishing emails, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. We used a set of emails including phishing emails from the real world. We collect experimental data including participants’ basic background information, time measurement, and their answers to survey questions. We first check whether or not factors such as intervention, phishing types, and incentive mechanisms play a major role in user behaviors when phishing attacks occur. We then evaluate the significance of each attribute with a performance score. The performance score is a metric demonstrating how a user makes a correct judgment on phishing while phishing attacks occur. We propose a machine learning framework, which contains attribute reduction and 10-fold cross-validation, to predict the performance of a user based on our collected data. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.191.223.123

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Li, Y.; Xiong, K. and Li, X. (2019). An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - SECRYPT; ISBN 978-989-758-378-0; ISSN 2184-3236, SciTePress, pages 529-534. DOI: 10.5220/0008119805290534

@conference{secrypt19,
author={Yi Li. and Kaiqi Xiong. and Xiangyang Li.},
title={An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - SECRYPT},
year={2019},
pages={529-534},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008119805290534},
isbn={978-989-758-378-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - SECRYPT
TI - An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
SN - 978-989-758-378-0
IS - 2184-3236
AU - Li, Y.
AU - Xiong, K.
AU - Li, X.
PY - 2019
SP - 529
EP - 534
DO - 10.5220/0008119805290534
PB - SciTePress