C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and...

Preview:

Citation preview

CMU Usable Privacy and Security Laboratoryhttp://cups.cs.cmu.edu/

Protecting People from Phishing: The Design and

Evaluation of an Embedded Training Email System

P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, E. Nunge

Phishing emailPhishing email

Phishing emailPhishing email

Subject: eBay: Urgent Notification From Billing Department

Phishing emailPhishing email

We regret to inform you that you eBay account could be suspended if you don’t update your account information.

Phishing emailPhishing email

https://signin.ebay.com/ws/eBayISAPI.dll?SignIn&sid=verify&co_partnerid=2&sidteid=0

Phishing websitePhishing website

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 7

What is phishing?What is phishing?

Phishing is “a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them.”

Financial Services Technology Consortium. Understanding and countering the phishing threat: A financial serviceindustry perspective. 2005.

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 8

Phishing is growingPhishing is growing 73 million US adults received more than 50

phishing emails a year in 2005

Gartner found approx. 30% users changed online banking behavior because of attacks like phishing in 2006

Gartner predicted $2.8 billion loss in 2006

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 9

Why phishing is a hard problem?Why phishing is a hard problem? Semantic attacks take advantage of the

way humans interact with computers

Phishing is one type of semantic attack

Phishers make use of the trust that users have on legitimate organizations

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 10

Counter measures for phishingCounter measures for phishing Silently eliminating the threat

• Regulatory & policy solutions

• Email filtering (SpamAssasin)

Warning users about the threat• Toolbars (SpoofGuard, TrustBar)

Training users not to fall for attacks

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 11

Why user education is hard?Why user education is hard? Security is a secondary task (Whitten et al.)

Users are not motivated to read privacy policies (Anton et al.)

Reading existing online training materials creates concern among users (Anandpara et al.)

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 12

Our hypothesesOur hypotheses Security notices are an ineffective medium

for training users

Users make better decision when trained by embedded methodology compared to security notices

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 13

Design constraintsDesign constraints People don’t proactively read the training

materials on the web

Organizations send “security notices” to train users and people don’t read security notices

People can learn from web-based training materials, if only we could get people to read them! (Kumaraguru, 2006)

P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Teaching Johnny Not to Fall for Phish.

Tech. rep., Cranegie Mellon University, 2007. http://www.cylab.cmu.edu/files/cmucylab07003.pdf.

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 14

Embedded training Embedded training We know people fall for phishing emails

So make training available through the phishing emails

Training materials are presented when the users actually fall for phishing emails

Embedded training exampleEmbedded training example

Subject: Revision to Your Amazon.com Information

Embedded training exampleEmbedded training example

Subject: Revision to Your Amazon.com Information

Please login and enter your information

http://www.amazon.com/exec/obidos/sign-in.html

Comic strip interventionComic strip intervention

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 18

Design rationaleDesign rationale What to show in the intervention?

When to show the intervention?

Analyzed instructions from most popular websites

Paper and HTML prototypes, 7 users each

Lessons learned • Two designs

• Present the training materials when users click on the link

Comic strip interventionComic strip intervention

Intervention #1 - Comic strip

Intervention #1 - Comic strip

Intervention #1 - Comic strip

Intervention #2 - Graphics and textIntervention #2 - Graphics and text

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 24

Study designStudy design

Think aloud study

Role play as Bobby Smith, 19 emails including 2 interventions, and 4 phishing emails

Three conditions: security notices, text / graphics intervention, comic strip intervention

10 non-expert participants in each condition, 30 total

Intervention #1 - Security noticesIntervention #1 - Security notices

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 26

Intervention #2 - Graphics and textIntervention #2 - Graphics and text

Intervention #3 - Comic stripIntervention #3 - Comic strip

Phish TrainingLegitimate Spam

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 29

User study - resultsUser study - results We treated clicking on link to be falling for

phishing

93% of the users who clicked went ahead and gave personal information

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 30

User study - resultsUser study - results

0

10

20

30

40

50

60

70

80

90

100

3: Phish 5:Training

7: Legit 11:Training

13: Legit 14:Phish-N

16:Phish-N

17:Phish

Emails which had a link in them

Pe

rce

nta

ge

of

use

rs w

ho

clic

ked

on

th

e li

nk

Notices Text / Graphics Comic

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 31

User study - resultsUser study - results Significant difference between security

notices and the comic strip group (p-value < 0.05)

Significant difference between the comic and the text / graphics group (p-value < 0.05)

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 32

ConclusionConclusion H1: Security notices are an ineffective

medium for training usersSup

porte

d

H2: Users make better decision when trained by embedded methodology compared to security notices Sup

porte

d

Latest comic strip designLatest comic strip design

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 34

Ongoing workOngoing work Measuring knowledge retention and

knowledge transfer• Knowledge retention is the ability to apply the

knowledge gained from one situation to another same or similar situation after a time period

• Knowledge transfer is the ability to transfer the knowledge gained from one situation to another situation after a time period

Is falling for phishing necessary for training?

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 35

Coming upComing up WWW 2007

• CANTINA: A Content-Based Approach to Detecting Phishing Web Sites

• Learning to Detect Phishing Emails

Our other research in anti-phishing http://cups.cs.cmu.edu/trust.php

Symposium On Usable Privacy and Security (SOUPS), July 18 - 20, 2007 at Carnegie Mellon University

• CMU Usable Privacy and Security Laboratory • http://www.cs.cmu.edu/~ponguru 36

AcknowledgementsAcknowledgements

Members of Supporting Trust Decision research group

Members of CUPS lab

CMU Usable Privacy and Security Laboratory

http://cups.cs.cmu.edu/

Recommended