Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Networking phishing susceptibility prediction method based on eye motion tracking and social worker parts

Pending Publication Date: 2021-11-23
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, even with these tools, phishing attacks still have a high success rate
The problem is that users often ignore the tool’s warnings. The reason for this problem is that the anti-phishing tool only predicts whether an email or website is a phishing attack, but does not predict the user’s sensitivity to phishing from the user’s perspective.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking phishing susceptibility prediction method based on eye motion tracking and social worker parts
  • Networking phishing susceptibility prediction method based on eye motion tracking and social worker parts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] 1) Information collection

[0064] First, the user’s basic characteristic information is collected in the form of a questionnaire, and the user’s personality information is analyzed according to the Big Five personality scale combined with the survey information. Then quantify the user's experience and knowledge of phishing, and provide an information basis for the subsequent training model.

[0065] Then, provide some phishing attacks to the user, and record the eye movement data of the user while browsing.

[0066] The eye movement data mainly records the user's stay time, gaze times, and return times on the website URL, lock, and browser security indicators such as http / https.

[0067] Finally, users are asked to score the degree of trust in all phishing attacks and their own transaction intentions, with the scores set between 0 and 1.

[0068] 2) Prediction of user trust

[0069] Score and quantify the user trust degree, the score is between 0 and 1; the support ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a phishing susceptibility prediction method based on eye motion tracking and social worker parts, and belongs to the field of social engineering. The method specifically comprises the following steps: firstly, collecting subject attributes of social worker parts of each user, and recording and cleaning eye motion data of each user browsing a phishing website; meanwhile, each user scores the trust degree of phishing and the transaction intention according to the user; training a support SVR model by using the collected data of each user; dividing the users into different susceptibility grades by using a K-Means clustering algorithm; and when a new user actually browses the phishing website, collecting subject attributes and eye motion data of the new user, inputting the subject attributes and the eye motion data into the SVR model, calculating susceptibility values by using output data, and dividing the susceptibility values into corresponding grades for prediction. According to the method, the trained SVR model is utilized to predict the susceptibility of the user to the phishing, and then a corresponding targeted defense method is made according to the strength of the susceptibility, so that the user experience is enhanced, and all-around protection is provided.

Description

technical field [0001] The invention is a phishing susceptibility prediction method based on eye movement tracking and social engineering elements, which belongs to the field of social engineering. Background technique [0002] Phishing is a kind of network fraud attack. Attackers use disguised emails or phishing websites that are very similar to legitimate websites to make users let down their vigilance, intending to influence users to click links or open attachments in emails, and further lure users in Entering personal information such as user names and passwords on fake websites is an attack method in which attackers use social engineering techniques to illegally obtain key information of victims. [0003] In recent years, with the rapid development of the communication industry and Internet-related technologies, people use the Internet more and more frequently, and there are more and more online activities. While people are enjoying the convenience brought by the Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q40/04G06K9/62H04L29/06
CPCG06Q10/06393G06Q40/04H04L63/1483G06F18/23213G06F18/2411G06F18/214
Inventor 郑康锋王哲高华东武斌伍淳华
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products