NoPhish: An Anti-Phishing Education App

作者: Gamze Canova , Melanie Volkamer , Clemens Bergmann , Roland Borza

DOI: 10.1007/978-3-319-11851-2_14

关键词: ParsingSpear phishingThe InternetComputer sciencePhishing detectionSmartphone appPhishingGame basedInternet privacyTrustworthiness

摘要: Phishing is still a prevalent issue in today’s Internet. It can have financial or personal consequences. Attacks continue to become more and sophisticated the advanced ones (including spear phishing) only be detected if people carefully check URLs. We developed game based smartphone app – NoPhish educate accessing, parsing checking URLs; i.e. enabling them distinguish trustworthy non-trustworthy websites. Throughout several levels information provided phishing detection exercised.

参考文章(9)
Peter Stavroulakis, Mark Stamp, Handbook of Information and Communication Security Springer Publishing Company, Incorporated. ,(2010) , 10.1007/978-3-642-04117-4
Zulfikar Ramzan, Phishing Attacks and Countermeasures Handbook of Information and Communication Security. pp. 433- 448 ,(2010) , 10.1007/978-3-642-04117-4_23
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma, John Aycock, Does domain highlighting help people identify phishing sites? Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11. pp. 2075- 2084 ,(2011) , 10.1145/1978942.1979244
Melanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer, Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany ieee computer security foundations symposium. pp. 46- 52 ,(2013) , 10.1109/STAST.2013.12
Kenny Jansson, Rossouw von Solms, Simulating malicious emails to educate end users on-demand 2011 3rd Symposium on Web Society. pp. 74- 80 ,(2011) , 10.1109/SWS.2011.6101274
Edward L. Thorndike, , The fundamentals of learning American Journal of Psychology. ,vol. 47, pp. 707- ,(1932) , 10.1037/10976-000
Tianyang Li, Fuye Han, Shuai Ding, Zhen Chen, LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform international conference on computer communications and networks. pp. 1- 5 ,(2011) , 10.1109/ICCCN.2011.6005822
Rachna Dhamija, J. D. Tygar, Marti Hearst, Why phishing works human factors in computing systems. pp. 581- 590 ,(2006) , 10.1145/1124772.1124861
Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, Elizabeth Nunge, Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish symposium on usable privacy and security. pp. 88- 99 ,(2007) , 10.1145/1280680.1280692