All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

How to safely communicate with a phishing attacker by email?

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60162694%3AG43__%2F24%3A00560187" target="_blank" >RIV/60162694:G43__/24:00560187 - isvavai.cz</a>

  • Result on the web

    <a href="https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23" target="_blank" >https://papers.academic-conferences.org/index.php/eccws/issue/view/20/23</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    How to safely communicate with a phishing attacker by email?

  • Original language description

    The published study is a part of the long-term research of emails with phishing attacks against the article's author. In the previous three years, 3 experiments were carried out to analyze phishing emails. The result is their detailed classification. The subsequent experiment was focused on defense against phishing attacks using the rules of the MS Outlook email client. The last experiment, which is the article's content, is devoted to analyzing communications with phishing attackers. A fake identity was created for the experiment and security rules were set up. A total of 100 phishing emails were answered, with a preference for those whose content was not aimed at fulfilling any request; that was clarified during the communications. The conducted literature search confirmed the assumption that no one is engaged in similar research, so the results of the research may be more interesting for the cybersecurity community. The articles of the literary research are focused on the issue of social engineering from an interdisciplinary perspective. A great deal of attention has also been oriented on the influence of social networks on people's information perception or on their exploitation in cyber-attacks. The result of the study is a statistical analysis of communications and a detailed analysis of its content. Out of 100 replies to the phishing email, 32 (32%) were answered by the phisher. The longest communication had 6 cycles. If the phisher insisted aggressively on personal information, the communications were terminated. From the content of the communications, the attacker's procedures and his argumentation to obtain the required information were primarily examined. A detailed analysis of the texts from the communications aimed to answer the question of whether the phisher is a robot or a person. Further considerations are being made within the team on how to continue researching phishing attacks.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 22nd European Conference on Cyber Warfare and Security, ECCWS 2023

  • ISBN

    978-1-914587-70-2

  • ISSN

    2048-8610

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    100-107

  • Publisher name

    Academic Conferences International Limited Reading, UK

  • Place of publication

    Curtis Farm, Kidmore End, Reading, RG4 9AY, UK

  • Event location

    Athény, Řecká republika

  • Event date

    Jun 22, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article