Rodyti trumpą aprašą

dc.contributor.authorRastenis, Justinas
dc.contributor.authorRamanauskaitė, Simona
dc.contributor.authorJanulevičius, Justinas
dc.contributor.authorČenys, Antanas
dc.contributor.authorSlotkienė, Asta
dc.contributor.authorPakrijauskas, Kęstutis
dc.date.accessioned2023-09-18T20:22:33Z
dc.date.available2023-09-18T20:22:33Z
dc.date.issued2020
dc.identifier.urihttps://etalpykla.vilniustech.lt/handle/123456789/149216
dc.description.abstractThe amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain a user’s personal or secret information. The variety of phishing attacks is very broad, and usage of novel, more sophisticated methods complicates its automated filtering. Therefore, it is important to form up-to-date and detailed phishing attack taxonomy, which could be used for both human education purposes as well as phishing attack discrete notation. In this paper, we propose an e-mail-based phishing attack taxonomy, which includes six phases of the attack. Each phase has at least one criterion for the attack categorization. Each category is described, and in some cases the categories have sub-classes to present the full variety of phishing attacks. The proposed taxonomy is compared to similar taxonomies. Our taxonomy outperforms other phishing attack taxonomies in numbers of phases, criteria and distinguished classes. Validation of the proposed taxonomy is achieved by adapting it as a phishing attack notation for an incident management system. Taxonomy usage for phishing attack notation increases the level of description of phishing attacks compared to free-form phishing attack descriptions.eng
dc.formatPDF
dc.format.extentp. 1-15
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.relation.isreferencedbyChemical abstracts
dc.relation.isreferencedbyDOAJ
dc.relation.isreferencedbyINSPEC
dc.relation.isreferencedbyScopus
dc.relation.isreferencedbyScience Citation Index Expanded (Web of Science)
dc.rightsLaisvai prieinamas internete
dc.source.urihttps://doi.org/10.3390/app10072363
dc.source.urihttps://www.mdpi.com/2076-3417/10/7/2363/htm
dc.source.urihttps://talpykla.elaba.lt/elaba-fedora/objects/elaba:54412353/datastreams/MAIN/content
dc.titleE-mail-based phishing attack taxonomy
dc.typeStraipsnis Web of Science DB / Article in Web of Science DB
dcterms.accessRightsThis article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
dcterms.licenseCreative Commons – Attribution – 4.0 International
dcterms.references23
dc.type.pubtypeS1 - Straipsnis Web of Science DB / Web of Science DB article
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.facultyFundamentinių mokslų fakultetas / Faculty of Fundamental Sciences
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.researchfieldN 009 - Informatika / Computer science
dc.subject.vgtuprioritizedfieldsIK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security
dc.subject.ltspecializationsL106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies
dc.subject.enphishing
dc.subject.ene-mail
dc.subject.entaxonomy
dc.subject.ennotation
dcterms.sourcetitleApplied sciences
dc.description.issueiss. 7
dc.description.volumevol. 10
dc.publisher.nameMDPI
dc.publisher.cityBasel
dc.identifier.doi000533356200162
dc.identifier.doi10.3390/app10072363
dc.identifier.elaba54412353


Šio įrašo failai

Thumbnail
Thumbnail

Šis įrašas yra šioje (-se) kolekcijoje (-ose)

Rodyti trumpą aprašą