Defending the Weakest Link: Intrusion via Social Engineering

防御最薄弱的环节:通过社会工程入侵

基本信息

  • 批准号:
    EP/D051819/1
  • 负责人:
  • 金额:
    $ 24.12万
  • 依托单位:
  • 依托单位国家:
    英国
  • 项目类别:
    Research Grant
  • 财政年份:
    2006
  • 资助国家:
    英国
  • 起止时间:
    2006 至 无数据
  • 项目状态:
    已结题

项目摘要

Fraud has been with us since time immemorial. With the rise of cyberspace opportunities for fraud abound. Recent years has seen a dramatic increase in what have become known as 'phishing' attacks. The most obvious means is via email. You might receive an email purporting to be from a familiar organisation, e.g. your bank, indicating that some information they maintain on you is inaccurate. You are requested to click on a link that takes you to a web page where you are requested to enter confidential information, such as your account number and on-line banking password details (and other confidential information). The message might also threaten to suspend you account if you do not do so.On the face of it this is a plausible scenario. The messages and web site look authentic, but they are not. If you have responded as requested then your confidential details are now in the hands of a frauster. What you expected to be the result of your actions is not the actual result - though it may be a while (too late) before you realise this. Your model of the world is at odds with reality. But by scrutinising the email carefully can we deduce that it is likely to be a phishing attack?This project will investigate phishing attacks, attempting to extract features of attempted cons. We shall do this using our security expertise and experience informed by methodical empirical surveys carried out by an experienced psychology researcher.If we can formalise these features then we can attempt to automatically detect phishing attacks. The benefits of doing so are obvious. Phishing attacks may be short lived; they need only to persuade a few unfortunate naive people to fall for the con to have succeeded. We need to identify phishing attacks at the earliest opportunity. We aim to develop prototype tool support to determine the degree to which we can actually detect phishing attacks automatically and test it out initially in a campus environment (where user sophistication varies hugely).
欺诈自古以来就伴随着我们。随着网络空间的兴起,欺诈的机会比比皆是。近年来,所谓的“网络钓鱼”攻击急剧增加。最明显的方式是通过电子邮件。您可能会收到一封声称来自熟悉机构(例如您的银行)的电子邮件,表明他们保存的有关您的某些信息不准确。您需要点击一个链接,该链接将带您进入一个网页,您需要在该网页上输入机密信息,例如您的账号和在线银行密码详细信息(以及其他机密信息)。如果你不这样做,这条信息也可能威胁要暂停你的帐户。从表面上看,这是一个似是而非的情况。这些信息和网站看起来是真实的,但事实并非如此。如果你已经按照要求做出了回应,那么你的机密信息现在就掌握在一个骗子手中。你所期望的结果并不是你行为的实际结果--尽管在你意识到这一点之前可能需要一段时间(太晚了)。你的世界观与现实不符。但是,通过仔细检查电子邮件,我们是否可以推断出它很可能是一个网络钓鱼攻击?这个项目将调查网络钓鱼攻击,试图提取的特征企图cons。我们将使用我们的安全专业知识和经验,通过有经验的心理学研究人员进行了有条不紊的实证调查告知这一点。如果我们可以正式这些功能,那么我们可以尝试自动检测网络钓鱼攻击。这样做的好处是显而易见的。网络钓鱼攻击可能是短暂的;他们只需要说服一些不幸的天真的人上当受骗就可以成功。我们需要尽早识别网络钓鱼攻击。我们的目标是开发原型工具支持,以确定我们实际上可以自动检测钓鱼攻击的程度,并在校园环境中进行初步测试(用户复杂程度差异很大)。

项目成果

期刊论文数量(9)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Modelling user-phishing interaction
Detection of Phishing Websites by User Behaviours
通过用户行为检测钓鱼网站
  • DOI:
  • 发表时间:
    2008
  • 期刊:
  • 影响因子:
    0
  • 作者:
    X Dong
  • 通讯作者:
    X Dong
The Phish in the Pond: Scam emails as literature (also invited as book chapter)
池塘里的网络钓鱼:诈骗电子邮件作为文献(也被邀请作为书籍章节)
  • DOI:
  • 发表时间:
    2010
  • 期刊:
  • 影响因子:
    0
  • 作者:
    M Blythe
  • 通讯作者:
    M Blythe
The placement-configuration problem for intrusion detection nodes in wireless sensor networks
无线传感器网络中入侵检测节点的放置配置问题
Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings
信息和通信安全 - 第 10 届国际会议,ICICS 2008 英国伯明翰,2008 年 10 月 20 日至 22 日会议记录
  • DOI:
    10.1007/978-3-540-88625-9_4
  • 发表时间:
    2008
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Dong X
  • 通讯作者:
    Dong X
{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

John Clark其他文献

Marx, Bakunin and the Problem of Social Transformation
马克思、巴枯宁与社会转型问题
  • DOI:
    10.3817/1279042080
  • 发表时间:
    1979
  • 期刊:
  • 影响因子:
    0.1
  • 作者:
    John Clark
  • 通讯作者:
    John Clark
An Introduction to Phonetics and Phonology
语音学和音系学导论
The anarchist moment : reflections on culture, nature, and power
无政府主义时刻:对文化、自然和权力的反思
  • DOI:
  • 发表时间:
    1983
  • 期刊:
  • 影响因子:
    0
  • 作者:
    John Clark
  • 通讯作者:
    John Clark
A revision of Australian species of Rhytidoponera Mayr (Formicidae)
澳大利亚 Rhytidoponera Mayr 种(蚁科)的修订版
NewYork‐Presbyterian Hospital uses Six Sigma to build a culture of quality and innovation
纽约长老会医院利用六西格码打造质量和创新文化
  • DOI:
    10.1002/joe.20108
  • 发表时间:
    2006
  • 期刊:
  • 影响因子:
    0
  • 作者:
    E. Craven;John Clark;M. Cramer;S. Corwin;Mary Cooper
  • 通讯作者:
    Mary Cooper

John Clark的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('John Clark', 18)}}的其他基金

Security of Digital Twins in Manufacturing
制造中数字孪生的安全性
  • 批准号:
    EP/V039156/1
  • 财政年份:
    2021
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
Collaborative Research: REVSYS: A revision of the sectional classification of Columnea (Gesneriaceae) and the species of section Ortholoma
合作研究:REVSYS:柱叶属(苦苣苔科)科分类和 Ortholoma 科种的修订
  • 批准号:
    0949169
  • 财政年份:
    2010
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Standard Grant
Phylogenetics and taxonomic revision of the neotropical genus Drymonia (Gesneriaceae, tribe Episcieae)
新热带苦苣苔属(Gesneriaceae,Episcieae 族)的系统发育和分类学修订
  • 批准号:
    0841958
  • 财政年份:
    2009
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Standard Grant
The Birth, Life and Death of Semantic Mutants
语义突变体的诞生、生存和死亡
  • 批准号:
    EP/G043604/1
  • 财政年份:
    2009
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
System-Smart Intrusion Detection
系统-智能入侵检测
  • 批准号:
    EP/E028128/1
  • 财政年份:
    2007
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
SEBASE: Software Engineering By Automated SEarch
SEBASE:自动搜索的软件工程
  • 批准号:
    EP/D050618/1
  • 财政年份:
    2006
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
Microscopic Theory of Quantum Fluids and Nuclear Systems
量子流体和核系统的微观理论
  • 批准号:
    0140316
  • 财政年份:
    2002
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Continuing Grant
Collaborative Research: Southern Grassroots Party Activists, 2001
合作研究:南方草根党活动人士,2001
  • 批准号:
    9986523
  • 财政年份:
    2000
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Standard Grant
Microscopic Theory of Quantum Fluids and Nuclear Systems
量子流体和核系统的微观理论
  • 批准号:
    9900713
  • 财政年份:
    1999
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Continuing Grant
Microscopic Theory of Quantum Fluids and Nuclear Systems
量子流体和核系统的微观理论
  • 批准号:
    9602127
  • 财政年份:
    1996
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Continuing Grant

相似海外基金

The weakest link: new methods to measure the strength of geological faults
最薄弱的环节:测量地质断层强度的新方法
  • 批准号:
    RGPIN-2016-04677
  • 财政年份:
    2021
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Discovery Grants Program - Individual
Heterojunctions as the Weakest Link: A Fundamental Investigation of Damage Evolution in Electronic Devices
异质结作为最薄弱的环节:电子设备损伤演化的基础研究
  • 批准号:
    2015795
  • 财政年份:
    2020
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Standard Grant
The weakest link: new methods to measure the strength of geological faults
最薄弱的环节:测量地质断层强度的新方法
  • 批准号:
    RGPIN-2016-04677
  • 财政年份:
    2019
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Discovery Grants Program - Individual
The weakest link: new methods to measure the strength of geological faults
最薄弱的环节:测量地质断层强度的新方法
  • 批准号:
    RGPIN-2016-04677
  • 财政年份:
    2018
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Discovery Grants Program - Individual
Survival of the Weakest: Preserving and Analysing Born-Digital Records to Understand How Small Poetry Publishers Survive in the Global Marketplace
弱者生存:保存和分析原生数字记录以了解小型诗歌出版商如何在全球市场中生存
  • 批准号:
    AH/R00773X/1
  • 财政年份:
    2018
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Fellowship
The weakest link: new methods to measure the strength of geological faults
最薄弱的环节:测量地质断层强度的新方法
  • 批准号:
    RGPIN-2016-04677
  • 财政年份:
    2017
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Discovery Grants Program - Individual
Targeting the weakest links in DNA for selective structural recognition
针对 DNA 中最薄弱的环节进行选择性结构识别
  • 批准号:
    BB/P019250/1
  • 财政年份:
    2017
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
Targeting the weakest links in DNA for selective structural recognition
针对 DNA 中最薄弱的环节进行选择性结构识别
  • 批准号:
    BB/P021328/1
  • 财政年份:
    2017
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Research Grant
The weakest link: new methods to measure the strength of geological faults
最薄弱的环节:测量地质断层强度的新方法
  • 批准号:
    RGPIN-2016-04677
  • 财政年份:
    2016
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Discovery Grants Program - Individual
Exploring the weakest bond: Structure and ionization of the Helium Dimer, Trimer and the search for the Efimov State
探索最弱的键:氦二聚体、三聚体的结构和电离以及 Efimov 态的搜索
  • 批准号:
    115609961
  • 财政年份:
    2009
  • 资助金额:
    $ 24.12万
  • 项目类别:
    Reinhart Koselleck Projects
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了