Visible to the public Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability - July 2015Conflict Detection Enabled

Public Audience
Purpose: To highlight project progress. Information is generally at a higher level which is accessible to the interested public. All information contained in the report (regions 1-3) is a Government Deliverable/CDRL.

PI(s):  Christopher Mayhorn, Emerson Murphy-Hill
Researchers: Allaire Welk, Olga Zielinska

 

HARD PROBLEM(S) ADDRESSED

  • Human Behavior - Ongoing efforts have focused on understanding how mental models vary between novice users, experts (such as IT professionals), and hackers should be useful in accomplishing the ultimate goal of the work: to build secure systems that reduce user vulnerability to phishing. Moreover, mapping out the mental models that underlie security-related decision making should also inform behavioral models of users, security-experts (i.e., system administrators), and adversaries seeking to exploit system functionality. 

 

PUBLICATIONS

 

ACCOMPLISHMENT HIGHLIGHTS

  • We bolstered participation in the mental models study such that the final results included data from 20 novices and 15 experts. Consistent with our preliminary results, observed expert mental models were more complex with more links between concepts. Specifically, experts had sixteen, thirteen, and fifteen links in the networks describing the prevention, trends, and consequences of phishing, respectively; however, novices only had eleven, nine, and nine links in the networks describing prevention, trends, and consequences of phishing, respectively. These results provide quantifiable network displays of mental models of novices and experts that cannot be seen through interviews or other more qualitative investigation techniques. This information could provide a basis for future research on how mental models could be used to determine phishing vulnerability and the effectiveness of phishing training.
  • In collaboration with the NCSU university IT group, we have begun a qualitative study to investigate the content of past phishing emails that were compiled and housed in databases published by Cornell and Brown University. Using classical persuasion articles by authors such as Cialdini and others, we have developed a preliminary coding scheme to allow for the systematic classification of attributes such as source and other factors that will inform our social engineering framework. Initial training of coders and preliminary coding is already underway.

  • Recently (on June 19, 2015), we were informed of a successful, large-scale phishing attack that compromised the personal information and login credentials of a large number of NCSU personnel within the College of Education. We are currently collaborating with the COE IT group to understand the characteristics of the attack (it appeared to come from the Dean of the College). Our goal is to pursue this fortuitous research opportunity and develop a small qualitative study to investigate how many people were targeted and how many "fell" for the phony request.