Visible to the public Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model

TitleSimulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Publication TypeConference Paper
Year of Publication2017
AuthorsWilliams, N., Li, S.
Conference Name2017 3rd IEEE International Conference on Cybernetics (CYBCONF)
PublisherIEEE
ISBN Number978-1-5386-2201-8
KeywordsACT-R cognitive behaviour architecture model, Computational modeling, Computer architecture, Computer crime, computer model, computer network security, Computer science, decision making, HTTPS padlock security indicator, Human Behavior, human behaviour, human detection, human factors, Knowledge engineering, phishing, phishing attacks, phishing detection scenario, phishing Websites, psychology, pubcrawl, representative Webpage, security, transport protocols, user interface support, Web sites
Abstract

The prevalence and effectiveness of phishing attacks, despite the presence of a vast array of technical defences, are due largely to the fact that attackers are ruthlessly targeting what is often referred to as the weakest link in the system - the human. This paper reports the results of an investigation into how end users behave when faced with phishing websites and how this behaviour exposes them to attack. Specifically, the paper presents a proof of concept computer model for simulating human behaviour with respect to phishing website detection based on the ACT-R cognitive architecture, and draws conclusions as to the applicability of this architecture to human behaviour modelling within a phishing detection scenario. Following the development of a high-level conceptual model of the phishing website detection process, the study draws upon ACT-R to model and simulate the cognitive processes involved in judging the validity of a representative webpage based primarily around the characteristics of the HTTPS padlock security indicator. The study concludes that despite the low-level nature of the architecture and its very basic user interface support, ACT-R possesses strong capabilities which map well onto the phishing use case, and that further work to more fully represent the range of human security knowledge and behaviours in an ACT-R model could lead to improved insights into how best to combine technical and human defences to reduce the risk to end users from phishing attacks.

URLhttps://ieeexplore.ieee.org/document/7985810
DOI10.1109/CYBConf.2017.7985810
Citation Keywilliams_simulating_2017