메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Improving phishing countermeasures: An analysis of expert interviews

Author keywords

Anti phishing; Electronic crime; Expert interview

Indexed keywords

ANTI-PHISHING; PHISHING; SEMI STRUCTURED INTERVIEWS;

EID: 72449210440     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECRIME.2009.5342608     Document Type: Conference Paper
Times cited : (20)

References (43)
  • 1
    • 72449138417 scopus 로고    scopus 로고
    • May, online, Available:, Accessed: Jan. 10, 2009
    • Messagelabs, "MessageLabs Intelligence May 2009," 2009. [online]. Available: http://www.messagelabs.com/intelligence.aspx. [Accessed: Jan. 10, 2009].
    • (2009) MessageLabs Intelligence , pp. 2009
  • 5
    • 72449168267 scopus 로고    scopus 로고
    • Google Inc, online] Available:, Accessed: Jan. 10, 2009
    • Google Inc, "Google safe browsing for Firefox," 2007. [online] Available:http://www.google.com/tools/firefox/safebrowsing/. [Accessed: Jan. 10, 2009].
    • (2007) Google safe browsing for Firefox
  • 6
    • 72449189001 scopus 로고    scopus 로고
    • online] Available:, Accessed: Jan. 10, 2009
    • Microsoft Corporation, "Phishing filter: Help protect yourself from online scams," 2008. [online] Available: http://www.microsoft.com/protect/ products/yourself/phishingfilter.mspx. [Accessed: Jan. 10, 2009].
    • (2008) Phishing filter: Help protect yourself from online scams
  • 7
    • 72449128420 scopus 로고    scopus 로고
    • Apple Inc. Visited Jan 1
    • Apple Inc. Visited Jan 1, 2009. http://www.apple.com/safari/features. html#security.
    • (2009)
  • 9
    • 84940457409 scopus 로고    scopus 로고
    • Information Week, online] Available:, Accessed: Jan 10, 2009
    • G. Keizer, "Phishers Beat Bank's Two-factor Authentication," Information Week, 2006. [online] Available: http://www.informationweek.com/news/ showArticle.jhtml?articleID=190400362. [Accessed: Jan 10, 2009]
    • (2006) Phishers Beat Bank's Two-factor Authentication
    • Keizer, G.1
  • 10
    • 28144438457 scopus 로고    scopus 로고
    • Financial Services Technology Consortium, White Paper, 2005, online, Available:, Accessed: Jan 10, 2009
    • Financial Services Technology Consortium, "Understanding and Countering the Phishing Threat," White Paper, 2005. [online]. Available: http://www.fstc.org/projects/docs/FSTC-Counter-Phishing-Project-Whitepaper.pdf. [Accessed: Jan 10, 2009]
    • Understanding and Countering the Phishing Threat
  • 11
    • 33748985945 scopus 로고    scopus 로고
    • Identity Theft Technology Council, online, Available:, Accessed Jan. 10, 2009
    • Identity Theft Technology Council, "Online identity theft: Phishing technology, chokepoints and countermeasures," 2005. [online]. Available: http://www.antiphishing.org/Phishing-dhs-report.pdf. [Accessed Jan. 10, 2009]
    • (2005) Online identity theft: Phishing technology, chokepoints and countermeasures
  • 12
    • 72449177740 scopus 로고    scopus 로고
    • A Call for Action
    • National Consumers League, Report, online, Available:, Accessed: Jan. 10
    • National Consumers League, "A Call for Action: Report from National Consumers League Anti-Phishing Retreat," Report, 2006. [online]. Available: http://www.nclnet.org/news/2006/Final%20NC%20Phishing%20Report.pdf. [Accessed: Jan. 10, 2009].
    • (2006) Report from National Consumers League Anti-Phishing Retreat
  • 13
    • 72449206949 scopus 로고    scopus 로고
    • Dept. of Homeland Security and the Anti-phishing Working Group, The crimeware landscape: malware, phishing, identity theft and beyond, Report, 2006. [online]. Available: http://www.antiphishing.org/reports/APWG- CrimewareReport.pdf. [Accessed: Jun. 10, 2009].
    • Dept. of Homeland Security and the Anti-phishing Working Group, "The crimeware landscape: malware, phishing, identity theft and beyond," Report, 2006. [online]. Available: http://www.antiphishing.org/reports/APWG- CrimewareReport.pdf. [Accessed: Jun. 10, 2009].
  • 14
    • 72449211627 scopus 로고    scopus 로고
    • What to Do If Your Website Has Been Hacked by Phishers
    • Anti-Phishing Working Group, online, Available:, Accessed May. 18, 2009
    • Anti-Phishing Working Group, "What to Do If Your Website Has Been Hacked by Phishers," Report, 2009. [online]. Available: http://www.apwg.org/reports/APWG-WTD-HackedWebsite.pdf. [Accessed May. 18, 2009].
    • (2009) Report
  • 15
    • 72449205832 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, Anti-Phishing Best Practices Recommendations for Registrars, Report, 2008. [online] Available: http://www.apwg.org/reports/APWG-RegistrarBestPractices.pdf. [Accesse May. 18,2009].
    • Anti-Phishing Working Group, "Anti-Phishing Best Practices Recommendations for Registrars," Report, 2008. [online] Available: http://www.apwg.org/reports/APWG-RegistrarBestPractices.pdf. [Accesse May. 18,2009].
  • 16
    • 72449135596 scopus 로고    scopus 로고
    • Anti-Phishing Best Practices for ISPs and Mailbox Providers
    • Message Anti-Abuse Working Group and Anti-Phishing Working Group, online, Available:, Accessed May. 18,2009
    • Message Anti-Abuse Working Group and Anti-Phishing Working Group, "Anti-Phishing Best Practices for ISPs and Mailbox Providers," Report, 2006. [online]. Available: http://www.apwg.org/reports/bestpracticesforisps. pdf. [Accessed May. 18,2009]
    • (2006) Report
  • 18
    • 84880704933 scopus 로고    scopus 로고
    • Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm
    • Harvard University. Available:, Accessed: Jun 10, 2009
    • S. Dynes, H. Brechbuhl and M. E. Johnson, "Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm," Fourth Workshop on the Economics of Information Security, Harvard University. Available:http://infosecon.net/workshop/pdf/51.pdf. [Accessed: Jun 10, 2009]
    • Fourth Workshop on the Economics of Information Security
    • Dynes, S.1    Brechbuhl, H.2    Johnson, M.E.3
  • 19
    • 84877884804 scopus 로고    scopus 로고
    • Private Sector Cyber Security Investment: An Empirical Analysis
    • Cambridge, UK. Available:, Accessed: Jun 10, 2009
    • B.R. Rowe and M. P. Gallaher, "Private Sector Cyber Security Investment: An Empirical Analysis," Fifth Workshop on the Economics of Information Security, 2006, Cambridge, UK. Available: http://weis2006. econinfosec.org/docs/18.pdf. [Accessed: Jun 10, 2009]
    • (2006) Fifth Workshop on the Economics of Information Security
    • Rowe, B.R.1    Gallaher, M.P.2
  • 20
    • 85084095292 scopus 로고    scopus 로고
    • T. Moore, R. Clayton and H. Stern, Temporal Correlations between Spam and Phishing Websites, 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09). April 21, 2009: Boston, MA.
    • T. Moore, R. Clayton and H. Stern, "Temporal Correlations between Spam and Phishing Websites," 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09). April 21, 2009: Boston, MA.
  • 21
    • 34848911641 scopus 로고    scopus 로고
    • Social phishing
    • Commun. ACM 50, 10 Oct., 94-100. DOI
    • T.N. Jagatic, N.A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM 50, 10 (Oct. 2007), 94-100. DOI= http://doi.acm.org/10.1145/1290958.1290968
    • (2007)
    • Jagatic, T.N.1    Johnson, N.A.2    Jakobsson, M.3    Menczer, F.4
  • 22
    • 72449140857 scopus 로고    scopus 로고
    • online, Available:, Accessed: Mar. 19, 2009
    • Symantec, "Symantec Global Internet Security Threat Report," volume XIV, 2009. [online]. Available: http://eval.symantec.com/mktginfo/ enterprise/white-papers/b-whitepaper-internet-security-threat-report-xiv-04- 2009.en-us.pdf. [Accessed: Mar. 19, 2009].
    • (2009) Symantec Global Internet Security Threat Report , vol.14
  • 23
    • 72449159034 scopus 로고    scopus 로고
    • Merchant Risk Council, March 3, 2009, online, Available:, Accessed: June 10, 2009
    • Merchant Risk Council, "Annual e-Commerce Fraud Survey Results," March 3, 2009. [online]. Available: https://www. merchantriskcouncil.org/index.cfm?fuseaction=Feature.showFeature&FeatureID= 119. [Accessed: June 10, 2009].
    • Annual e-Commerce Fraud Survey Results
  • 24
    • 0344792106 scopus 로고    scopus 로고
    • Managing Online Security Risks
    • New York, NY, Jun 1, 2000, online, Available:, Accessed: Jun 1, 2009
    • H. Varian, "Managing Online Security Risks," New York Times; New York, NY.; Jun 1, 2000. [online]. Available: http://people.ischool.berkeley. edu/~hal/people/hal/NYTimes/2000-06-01.html. [Accessed: Jun 1, 2009].
    • New York Times
    • Varian, H.1
  • 26
    • 72449193465 scopus 로고    scopus 로고
    • Net Applications. Inc, Browser market share Q4 2008, [online]. Available: http://marketshare.hitslink.com/report.aspx?qprid= 0&qpmr=15&qpdt=1&qpct=3&qpcal=l&qptimeframe=Q&qpsp=39. [Accessed: Jan. 10, 2009].
    • Net Applications. Inc, "Browser market share Q4 2008," [online]. Available: http://marketshare.hitslink.com/report.aspx?qprid= 0&qpmr=15&qpdt=1&qpct=3&qpcal=l&qptimeframe=Q&qpsp=39. [Accessed: Jan. 10, 2009].
  • 27
    • 72449133182 scopus 로고    scopus 로고
    • Zone Alarm, Smart Defense System, 2004 [online]. Available: http://smartdefense.zonealarm.com/tmpl/AdvisoryArticle?action=detail&aid= 20040128sa-000013. [Accessed: Jun. 1 2009].
    • Zone Alarm, "Smart Defense System", 2004 [online]. Available: http://smartdefense.zonealarm.com/tmpl/AdvisoryArticle?action=detail&aid= 20040128sa-000013. [Accessed: Jun. 1 2009].
  • 28
    • 33751312628 scopus 로고    scopus 로고
    • Time to Live on the Network,
    • Technical Report, online, Available:, Accessed: Jun 10
    • Avantgarde, "Time to Live on the Network," Technical Report, 2004. [online]. Available:http://www.avantgarde.com/xxxxttln.pdf. [Accessed: Jun 10, 2009]
    • (2004)
  • 29
    • 72449169885 scopus 로고    scopus 로고
    • T. Moore and R. Clayton. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing, 13th International Conference on Financial Cryptography and Data Security. February 23-26, 2009: Barbados.
    • T. Moore and R. Clayton. "Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing," 13th International Conference on Financial Cryptography and Data Security. February 23-26, 2009: Barbados.
  • 30
    • 84904793179 scopus 로고    scopus 로고
    • S. Sheng, B. Wardman, G. Warner, L.F. Cranor, J. Hong, and C. Zhang, An Empirical Analysis of Phishing Blacklists, To appear in 6th Conference in Email and Anti-Spam (Mountain view, CA, July 16-17, 2009). CEAS '09.
    • S. Sheng, B. Wardman, G. Warner, L.F. Cranor, J. Hong, and C. Zhang, "An Empirical Analysis of Phishing Blacklists," To appear in 6th Conference in Email and Anti-Spam (Mountain view, CA, July 16-17, 2009). CEAS '09.
  • 31
    • 67249096586 scopus 로고    scopus 로고
    • T. Moore and R. Clayton, The Consequence of Non-Cooperation in the Fight Against Phishing, Third APWG eCrime Researchers Summit. October 15-16, 2008: Atlanta, GA.
    • T. Moore and R. Clayton, "The Consequence of Non-Cooperation in the Fight Against Phishing," Third APWG eCrime Researchers Summit. October 15-16, 2008: Atlanta, GA.
  • 32
    • 84858981488 scopus 로고    scopus 로고
    • Host of Internet Spam Groups Is Cut Off,
    • Nov. 12
    • B. Krebs, "Host of Internet Spam Groups Is Cut Off," Washington Post, Nov. 12, 2008.
    • (2008) Washington Post
    • Krebs, B.1
  • 33
    • 72449162906 scopus 로고    scopus 로고
    • Interactive, April 2, online, Available:, Accessed: Jun 1, 2009
    • D. Danchev, "Google: Spam volume for Q1 back to pre-McColo levels," CBS Interactive, April 2, 2009. [online]. Available: http://blogs.zdnet.com/security/?p=3073&tag=rbxccnbzd1. [Accessed: Jun 1, 2009].
    • (2009) Google: Spam volume for Q1 back to pre-McColo levels
    • Danchev, D.1
  • 34
    • 72449157784 scopus 로고    scopus 로고
    • R.E. Church, McColo and the Difficulty of Fighting Spam, Internet.com, November 20, 2008. [online]. Available: http://itmanagement. earthweb.com/features/print.php/3786296. [Accessed: Jun. 1 2009].
    • R.E. Church, "McColo and the Difficulty of Fighting Spam", Internet.com, November 20, 2008. [online]. Available: http://itmanagement. earthweb.com/features/print.php/3786296. [Accessed: Jun. 1 2009].
  • 35
    • 72449188031 scopus 로고    scopus 로고
    • ASSOCIATEDBANK-CORP v. EARTHLINK, INC. Memorandum and order, 05-c-0233-s 2005. Available:http://www.iplawobserver.com/cases/2005-09-14-Associated-Banc- Corp-CDA-Section-230.pdf. [Accessed: Mar. 18, 2009].
    • ASSOCIATEDBANK-CORP v. EARTHLINK, INC. Memorandum and order, 05-c-0233-s 2005. Available:http://www.iplawobserver.com/cases/2005-09-14-Associated-Banc- Corp-CDA-Section-230.pdf. [Accessed: Mar. 18, 2009].
  • 37
    • 80052998524 scopus 로고    scopus 로고
    • Global Phishing Survey: Trends and Domain name use in 2H 2008
    • The Anti-phishing Working Group, May, online, Available:, Accessed: Jun. 1
    • The Anti-phishing Working Group, "Global Phishing Survey: Trends and Domain name use in 2H 2008", May 2009. [online]. Available: http://www.antiphishing.org/reports/APWG-GlobalPhishingSurvey2H2008.pdf. [Accessed: Jun. 1, 2009].
    • (2009)
  • 38
    • 72449134661 scopus 로고    scopus 로고
    • An Adaptive Shingling-based Approach using Search Engines for Zero False Positive Phish Detection, 2009
    • G. Xiang and J. Hong, "An Adaptive Shingling-based Approach using Search Engines for Zero False Positive Phish Detection," 2009. Under Submission.
    • Under Submission
    • Xiang, G.1    Hong, J.2
  • 39
    • 72449185041 scopus 로고    scopus 로고
    • Augmenting the Crowds: Fighting Phishing on a Budget, 2009
    • B. Pendleton, G. Xiang, and J. Hong, "Augmenting the Crowds: Fighting Phishing on a Budget," 2009. Under Submission.
    • Under Submission
    • Pendleton, B.1    Xiang, G.2    Hong, J.3
  • 40
    • 36849090201 scopus 로고    scopus 로고
    • Teaching Johnny not to fall for phish,
    • Tech. rep, Available
    • P. Kumaraguru, S. Sheng., A. Acquisti, L.F.Cranor, and J. Hong, "Teaching Johnny not to fall for phish," Tech. rep. 2007, Carnegie Mellon University. Available:http://www.cylab.cmu.edu/files/cmucylab07003.pdf.
    • (2007)
    • Kumaraguru, P.1    Sheng, S.2    Acquisti, A.3    Cranor, L.F.4    Hong, J.5
  • 41
    • 77953876778 scopus 로고    scopus 로고
    • Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
    • Anti-Phishing Working Group, October 4, Pittsburgh, USA
    • P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L.F. Cranor, and J. Hong, "Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer." e-Crime Researchers Summit, Anti-Phishing Working Group, October 4 - 5, 2007, Pittsburgh, USA.
    • (2007) e-Crime Researchers Summit , vol.5
    • Kumaraguru, P.1    Rhee, Y.2    Sheng, S.3    Hasan, S.4    Acquisti, A.5    Cranor, L.F.6    Hong, J.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.