Techniques for assisting users in making security decisions

We are witnessing an arms race between attackers and security experts in todays Internet. Attackers hide their intentions and mimic legitimate behaviour to evade detection. Prominent attacks target end- users systems with a wide range of goals, such as monetary, financial, political, espionage, dest...

Full description

Bibliographic Details
Published:
Online Access:http://hdl.handle.net/2047/D20253675
id ndltd-NEU--neu-cj82qd78k
record_format oai_dc
spelling ndltd-NEU--neu-cj82qd78k2021-05-27T05:11:53ZTechniques for assisting users in making security decisionsWe are witnessing an arms race between attackers and security experts in todays Internet. Attackers hide their intentions and mimic legitimate behaviour to evade detection. Prominent attacks target end- users systems with a wide range of goals, such as monetary, financial, political, espionage, destructive. In this thesis, I examined two well-known instances of these attacks. One of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links and potentially leading to a malicious domain or malware. Other examined approaches involve e-mail attacks, such as spearphishing and e-mail attachment attacks. By impersonating trusted e-mail senders through carefully crafted messages and spoofed metadata, adversaries can trick victims into launching attachments containing malicious code or into clicking on malicious links that grant attackers a foothold into otherwise well-protected networks. Unfortunately, current mitigations are unreliable and relying on fallible malware detection techniques or user education.http://hdl.handle.net/2047/D20253675
collection NDLTD
sources NDLTD
description We are witnessing an arms race between attackers and security experts in todays Internet. Attackers hide their intentions and mimic legitimate behaviour to evade detection. Prominent attacks target end- users systems with a wide range of goals, such as monetary, financial, political, espionage, destructive. In this thesis, I examined two well-known instances of these attacks. One of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links and potentially leading to a malicious domain or malware. Other examined approaches involve e-mail attacks, such as spearphishing and e-mail attachment attacks. By impersonating trusted e-mail senders through carefully crafted messages and spoofed metadata, adversaries can trick victims into launching attachments containing malicious code or into clicking on malicious links that grant attackers a foothold into otherwise well-protected networks. Unfortunately, current mitigations are unreliable and relying on fallible malware detection techniques or user education.
title Techniques for assisting users in making security decisions
spellingShingle Techniques for assisting users in making security decisions
title_short Techniques for assisting users in making security decisions
title_full Techniques for assisting users in making security decisions
title_fullStr Techniques for assisting users in making security decisions
title_full_unstemmed Techniques for assisting users in making security decisions
title_sort techniques for assisting users in making security decisions
publishDate
url http://hdl.handle.net/2047/D20253675
_version_ 1719407401714581504