2018
DOI: 10.4108/eai.26-5-2020.166354
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies

Abstract: A solution to help victims against phishing is anticipating and leveraging impacts related to phisher actions. In this regard, this work reshapes game theoretical logic between Intrusion Detection System (IDS) agents and insiders to email spear-phishing interactions. The email spear-phishing attack is designed as a non-cooperative and repeated game between opponents. Additionally, this work relies on Quantal Response Equilibrium (QRE) to build a game theoretical approach to predict the phisher's future intent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…A cyber-defense scenario almost always depends on game theory to understand the attacker's motives and perspective for maximizing the defender's reward. Many similar games have been designed for phishing URL detection with humans in the loop [29,43,14] and adversarial games for generative networks [22,31,17]. However, no work has been proposed, combining adversarial components of GAN and gametheoretic perspectives of attacker-defender for detecting phishing URLs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A cyber-defense scenario almost always depends on game theory to understand the attacker's motives and perspective for maximizing the defender's reward. Many similar games have been designed for phishing URL detection with humans in the loop [29,43,14] and adversarial games for generative networks [22,31,17]. However, no work has been proposed, combining adversarial components of GAN and gametheoretic perspectives of attacker-defender for detecting phishing URLs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Meanwhile, the attacker's relationship i.e. fisher and his potential victim can be described as the interaction of players [18]. In this research, the authors introduce an approach according to which the game between IDS agents and insiders was adapted.…”
Section: Introductionmentioning
confidence: 99%
“…The game theory apparatus can be used in different ways. The researchers [18], [19] propose approaches according to which game theory makes it possible to gain knowledge about the interaction between the fisher and the victim in order to predict the next actions of the fisher in accordance with information from past interactions and recommend actions on the side of the victim. These works describe the game in such a way that it is possible to predict the future intentions of the fisher in accordance with the past actions of both players.…”
Section: Introductionmentioning
confidence: 99%
“…Game theory is a formal mathematical tool for studying situations in which competition or collaboration takes place between several individuals or groups 11 . This tool has been widely used in various studies including network security and cyber security in cases such as privacy, 12 application security, 13 botnet attacks, 14 and phishing 15 . We have developed a privacy‐preserving model that analyzes the impact of user interactions based on game theory.…”
Section: Introductionmentioning
confidence: 99%
“…11 This tool has been widely used in various studies including network security and cyber security in cases such as privacy, 12 application security, 13 botnet attacks, 14 and phishing. 15 We have developed a privacy-preserving model that analyzes the impact of user interactions based on game theory. This theory examines strategic situations in which a player's success in decision-making depends on other players' choices and identifies the Nash equilibrium points.…”
Section: Introductionmentioning
confidence: 99%