메뉴 건너뛰기




Volumn 50, Issue 4, 2011, Pages 662-672

Assessing the severity of phishing attacks: A hybrid data mining approach

Author keywords

Financial loss; Phishing; Risk; Supervised classification; Text phrase extraction; Variable importance

Indexed keywords

FINANCIAL LOSS; PHISHING; PHRASE EXTRACTION; SUPERVISED CLASSIFICATION; VARIABLE IMPORTANCE;

EID: 79151482463     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2010.08.020     Document Type: Article
Times cited : (69)

References (55)
  • 2
    • 33750966470 scopus 로고    scopus 로고
    • Exploring the characteristics of internet security breaches that impact the market value of breached firms
    • F.K. Andoh-Baidoo, and K.-M. Osei-Bryson Exploring the characteristics of internet security breaches that impact the market value of breached firms Expert Systems with Applications 32 3 2007 703 725
    • (2007) Expert Systems with Applications , vol.32 , Issue.3 , pp. 703-725
    • Andoh-Baidoo, F.K.1    Osei-Bryson, K.-M.2
  • 4
    • 79151482437 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • APWG Phishing Activity Trends Report December 2005 2005 Anti-Phishing Working Group 1 15 (http://www.antiphishing.org/reports/apwg-report-DEC2005- FINAL.pdf )
    • (2005) Phishing Activity Trends Report December 2005 , pp. 1-15
  • 5
    • 79151485784 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • APWG Phishing Activity Trends Report Second Half 2008 2009 Anti-Phishing Working Group 1 12 (http://www.antiphishing.org/reports/apwg-report-H2-2008.pdf )
    • (2009) Phishing Activity Trends Report Second Half 2008 , pp. 1-12
  • 7
    • 33745186426 scopus 로고    scopus 로고
    • Phishing mongers, and posers
    • H. Berghel Phishing mongers, and posers Communications of the ACM 49 4 2006 21 25
    • (2006) Communications of the ACM , vol.49 , Issue.4 , pp. 21-25
    • Berghel, H.1
  • 8
    • 40749083825 scopus 로고    scopus 로고
    • Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
    • I. Bose, and A.C.M. Leung Unveiling the mask of phishing: threats, preventive measures, and responsibilities Communications of the Association for Information Systems 19 24 2007 544 566
    • (2007) Communications of the Association for Information Systems , vol.19 , Issue.24 , pp. 544-566
    • Bose, I.1    Leung, A.C.M.2
  • 9
    • 0035924010 scopus 로고    scopus 로고
    • Business data mining-a machine learning perspective
    • I. Bose, and R.K. Mahapatra Business data mining-a machine learning perspective Information & Management 39 3 2001 211 225
    • (2001) Information & Management , vol.39 , Issue.3 , pp. 211-225
    • Bose, I.1    Mahapatra, R.K.2
  • 10
    • 25444448031 scopus 로고    scopus 로고
    • Phishing anxiety may make you miss messages
    • A. Brandt Phishing anxiety may make you miss messages PC World 23 10 2005 34
    • (2005) PC World , vol.23 , Issue.10 , pp. 34
    • Brandt, A.1
  • 11
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C.J.C. Burges A tutorial on support vector machines for pattern recognition Data Mining and Knowledge Discovery 2 2 1998 121 167
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 21
    • 85008020099 scopus 로고    scopus 로고
    • Phishing attacks rising, but dollar losses down
    • G. Goth Phishing attacks rising, but dollar losses down IEEE Security & Privacy Magazine 3 1 2005 8
    • (2005) IEEE Security & Privacy Magazine , vol.3 , Issue.1 , pp. 8
    • Goth, G.1
  • 23
    • 2342595855 scopus 로고    scopus 로고
    • Determining the appropriate amount of data for classifying consumers for direct marketing purposes
    • C.M. Heilman, F. Kaefer, and S.D. Ramenofsky Determining the appropriate amount of data for classifying consumers for direct marketing purposes Journal of Interactive Marketing 17 3 2003 5 28
    • (2003) Journal of Interactive Marketing , vol.17 , Issue.3 , pp. 5-28
    • Heilman, C.M.1    Kaefer, F.2    Ramenofsky, S.D.3
  • 24
    • 12444307548 scopus 로고    scopus 로고
    • ID theft: The US legal fight back
    • S. Hinde ID theft: the US legal fight back Computer Fraud & Security 2004 10 2004 7 9
    • (2004) Computer Fraud & Security , vol.2004 , Issue.10 , pp. 7-9
    • Hinde, S.1
  • 25
    • 61349124807 scopus 로고    scopus 로고
    • Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
    • C. Holton Identifying disgruntled employee systems fraud risk through text mining: a simple solution for a multi-billion dollar problem Decision Support Systems 46 4 2009 853 864
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 853-864
    • Holton, C.1
  • 28
    • 13544274197 scopus 로고    scopus 로고
    • A neural network application to consumer classification to improve the timing of direct marketing activities
    • F. Kaefer, C.M. Heilman, and S.D. Ramenofsky A neural network application to consumer classification to improve the timing of direct marketing activities Computers & Operations Research 32 10 2005 2595 2615
    • (2005) Computers & Operations Research , vol.32 , Issue.10 , pp. 2595-2615
    • Kaefer, F.1    Heilman, C.M.2    Ramenofsky, S.D.3
  • 30
    • 35948938098 scopus 로고    scopus 로고
    • Market reactions to information security breach announcements: An empirical analysis
    • K. Kannan, J. Rees, and S. Sridhar Market reactions to information security breach announcements: an empirical analysis International Journal of Electronic Commerce 12 1 2007 69 91
    • (2007) International Journal of Electronic Commerce , vol.12 , Issue.1 , pp. 69-91
    • Kannan, K.1    Rees, J.2    Sridhar, S.3
  • 31
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies?
    • A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies? Information & Management 41 5 2004 597 607
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 34
    • 2342532313 scopus 로고    scopus 로고
    • Criminals become tech savvy
    • E. Levy Criminals become tech savvy IEEE Security & Privacy 2 2 2004 65 68
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 65-68
    • Levy, E.1
  • 36
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • K.D. Loch, H.H. Carr, and M.E. Warkentin Threats to information systems: today's reality, yesterday's understanding MIS Quarterly 16 2 1992 173 186
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 38
    • 72049121891 scopus 로고    scopus 로고
    • Discovering company revenue relations from news: A network approach
    • Z. Ma, O.R.L. Sheng, and G. Pant Discovering company revenue relations from news: a network approach Decision Support Systems 47 4 2009 408 414
    • (2009) Decision Support Systems , vol.47 , Issue.4 , pp. 408-414
    • Ma, Z.1    Sheng, O.R.L.2    Pant, G.3
  • 39
    • 0031510754 scopus 로고    scopus 로고
    • Event studies in management research: Theoretical and empirical issues
    • A. McWilliams, and D. Siegel Event studies in management research: theoretical and empirical issues Academy of Management Journal 40 3 1997 626 657
    • (1997) Academy of Management Journal , vol.40 , Issue.3 , pp. 626-657
    • McWilliams, A.1    Siegel, D.2
  • 40
    • 79151480693 scopus 로고    scopus 로고
    • T. Powell Ounce of ID theft protection worth more than agony of restoring good name, MyWestTexas.com 2008 (http://www.mywesttexas.com/articles/2008/05/ 26/news/opinion/columns/trish-powell/bbb-5-23.txt )
    • (2008) Academy of Management Journal
    • Powell, T.1
  • 42
    • 79151473926 scopus 로고    scopus 로고
    • Rulequest Research, Is See5/C5.0 Better Than C4.5? Rulequest Research
    • Rulequest Research, Is See5/C5.0 Better Than C4.5? Rulequest Research, 2008, (http://www.rulequest.com/see5-comparison.html ).
    • (2008)
  • 49
    • 33750315866 scopus 로고    scopus 로고
    • Accommodating individual preferences in the categorization of documents: A personalized clustering approach
    • C.-P. Wei, R.H.L. Chiang, and C.-C. Wu Accommodating individual preferences in the categorization of documents: a personalized clustering approach Journal of Management Information Systems 23 2 2006 173 201
    • (2006) Journal of Management Information Systems , vol.23 , Issue.2 , pp. 173-201
    • Wei, C.-P.1    Chiang, R.H.L.2    Wu, C.-C.3
  • 50
    • 4243198165 scopus 로고    scopus 로고
    • Threats to information security
    • M.E. Whitman Threats to information security Communications of the ACM 46 8 2003 91 95
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 51
    • 39749142244 scopus 로고    scopus 로고
    • Wisecrackers, a theory-grounded investigation of phishing and pretext social engineering threats to information security
    • M. Workman Wisecrackers, a theory-grounded investigation of phishing and pretext social engineering threats to information security Journal of the American Society for Information Science and Technology 59 4 2008 662 674
    • (2008) Journal of the American Society for Information Science and Technology , vol.59 , Issue.4 , pp. 662-674
    • Workman, M.1
  • 55
    • 0040431304 scopus 로고    scopus 로고
    • Data mining for network intrusion detection: A comparison of alternative methods
    • D. Zhu, G. Premkumar, X. Zhang, and C.-.H. Chu Data mining for network intrusion detection: a comparison of alternative methods Decision Sciences 32 4 2001 635 660
    • (2001) Decision Sciences , vol.32 , Issue.4 , pp. 635-660
    • Zhu, D.1    Premkumar, G.2    Zhang, X.3    Chu -. C, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.