Drexel University Home Pagewww.drexel.edu DREXEL UNIVERSITY LIBRARIES HOMEPAGE >>
iDEA DREXEL ARCHIVES >>

iDEA: Drexel E-repository and Archives > Drexel Academic Community > College of Information Science and Technology > Research Day Posters (IST) > Designing an ontology of "deceptive communication" for analysis of phishing attacks based on communication theories

Please use this identifier to cite or link to this item: http://hdl.handle.net/1860/3862

Title: Designing an ontology of "deceptive communication" for analysis of phishing attacks based on communication theories
Authors: Lee, Ki Jung
Song, Il-Yeol
Keywords: Phishing;Information theory
Issue Date: 15-Apr-2010
Series/Report no.: IST Research Day 2010 posters
Abstract: Although the attack mechanism of deceptive phishing has been intensively researched, current methods of understanding phishing is limited in keeping up with the evolving nature of deceptive phishing attacks. Majority of them are designed to find deceptive clues from syntactic features of phishing messages rather than fundamental nature of information embedded in the messages. In our study, we seek analytical grounds of deceptive phishing from the perspective of interpersonal communication. We define that deceptive phishing is a form of communication, while analyzing the communication in the views of existing theories such as "interpersonal deception theory" and "information manipulation theory". The objectives of this study are two-fold; analyzing deceptive phishing based on existing communication theories and designing an ontology of deceptive phishing which can provide answers to analytical questions in relation to interpretations of phishing attacks. The ontology should offer general ideas about phishing as communication, reestablish current conception of phishing analysis, and provide background for the design of fresh analytical approaches. The study will offer foundation for understanding phishing in human communication perspective and provide opportunities for many security researchers to use, modify, extend, and reuse the ontology for their own research purposes.
URI: http://hdl.handle.net/1860/3862
Appears in Collections:Research Day Posters (IST)

Files in This Item:

File Description SizeFormat
Lee_2010.pdf37.06 MBAdobe PDFView/Open
View Statistics

Items in iDEA are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! iDEA Software Copyright © 2002-2010  Duraspace - Feedback