A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Generating phishing attacks using chatgpt

SS Roy, KV Naragam, S Nilizadeh - arXiv preprint arXiv:2305.05133, 2023 - arxiv.org
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …

Reproducibility and replicability of web measurement studies

N Demir, M Große-Kampmann, T Urban… - Proceedings of the …, 2022 - dl.acm.org
Web measurement studies can shed light on not yet fully understood phenomena and thus
are essential for analyzing how the modern Web works. This often requires building new …

Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt

N Begou, J Vinoy, A Duda… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
This paper explores the possibility of using Chat-GPT to develop advanced phishing attacks
and automate their large-scale deployment. We make ChatGPT generate the following parts …

PhishInPatterns: measuring elicited user interactions at scale on phishing websites

K Subramani, W Melicher, O Starov, P Vadrevu… - Proceedings of the …, 2022 - dl.acm.org
Despite phishing attacks and detection systems being extensively studied, phishing is still
on the rise and has recently reached an all-time high. Attacks are becoming increasingly …

Knowledge Expansion and Counterfactual Interaction for {Reference-Based} Phishing Detection

R Liu, Y Lin, Y Zhang, PH Lee, JS Dong - 32nd USENIX Security …, 2023 - usenix.org
Phishing attacks have been increasingly prevalent in recent years, significantly eroding
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …

{PhishPrint}: Evading phishing detection crawlers by prior profiling

B Acharya, P Vadrevu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Security companies often use web crawlers to detect phishing and other social engineering
attack websites. We built a novel, scalable, low-cost framework named PhishPrint to enable …

On the Similarity of Web Measurements Under Different Experimental Setups

N Demir, J Hörnemann, M Große-Kampmann… - Proceedings of the …, 2023 - dl.acm.org
Measurement studies are essential for research and industry alike better understand the
Web's inner workings and help quantify specific phenomena. Performing such studies is …

Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites

W Lee, J Hur, D Kim - Proceedings of the 19th ACM Asia Conference on …, 2024 - dl.acm.org
Phishing kits have become increasingly popular among cybercriminals because they offer
an easy-to-use and efficient way for phishing attackers to build phishing websites. Prior work …