File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.dss.2010.08.020
- Scopus: eid_2-s2.0-79151482463
- WOS: WOS:000287436700003
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Assessing the severity of phishing attacks: A hybrid data mining approach
Title | Assessing the severity of phishing attacks: A hybrid data mining approach |
---|---|
Authors | |
Keywords | Financial loss Phishing Risk Supervised classification Text phrase extraction Variable importance |
Issue Date | 2011 |
Publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/dss |
Citation | Decision Support Systems, 2011, v. 50 n. 4, p. 662-672 How to Cite? |
Abstract | Phishing is an online crime that increasingly plagues firms and their consumers. We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value suffered by the targeted firms. We analyze 1030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid method that predicts the severity of the attack with up to 89% accuracy using text phrase extraction and supervised classification. Our research identifies some important textual and financial variables that impact the severity of the attacks and potential financial loss. © 2010 Elsevier B.V. All rights reserved. |
Persistent Identifier | http://hdl.handle.net/10722/139825 |
ISSN | 2023 Impact Factor: 6.7 2023 SCImago Journal Rankings: 2.211 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, X | en_HK |
dc.contributor.author | Bose, I | en_HK |
dc.contributor.author | Leung, ACM | en_HK |
dc.contributor.author | Guo, C | en_HK |
dc.date.accessioned | 2011-09-23T05:57:06Z | - |
dc.date.available | 2011-09-23T05:57:06Z | - |
dc.date.issued | 2011 | en_HK |
dc.identifier.citation | Decision Support Systems, 2011, v. 50 n. 4, p. 662-672 | en_HK |
dc.identifier.issn | 0167-9236 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/139825 | - |
dc.description.abstract | Phishing is an online crime that increasingly plagues firms and their consumers. We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value suffered by the targeted firms. We analyze 1030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid method that predicts the severity of the attack with up to 89% accuracy using text phrase extraction and supervised classification. Our research identifies some important textual and financial variables that impact the severity of the attacks and potential financial loss. © 2010 Elsevier B.V. All rights reserved. | en_HK |
dc.language | eng | en_US |
dc.publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/dss | en_HK |
dc.relation.ispartof | Decision Support Systems | en_HK |
dc.subject | Financial loss | en_HK |
dc.subject | Phishing | en_HK |
dc.subject | Risk | en_HK |
dc.subject | Supervised classification | en_HK |
dc.subject | Text phrase extraction | en_HK |
dc.subject | Variable importance | en_HK |
dc.title | Assessing the severity of phishing attacks: A hybrid data mining approach | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0167-9236&volume=50&issue=4&spage=662&epage=672&date=2011&atitle=Assessing+the+severity+of+phishing+attacks:+a+hybrid+data+mining+approach | - |
dc.identifier.email | Bose, I: bose@business.hku.hk | en_HK |
dc.identifier.authority | Bose, I=rp01041 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.dss.2010.08.020 | en_HK |
dc.identifier.scopus | eid_2-s2.0-79151482463 | en_HK |
dc.identifier.hkuros | 193212 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79151482463&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 50 | en_HK |
dc.identifier.issue | 4 | en_HK |
dc.identifier.spage | 662 | en_HK |
dc.identifier.epage | 672 | en_HK |
dc.identifier.isi | WOS:000287436700003 | - |
dc.publisher.place | Netherlands | en_HK |
dc.identifier.scopusauthorid | Chen, X=14029590100 | en_HK |
dc.identifier.scopusauthorid | Bose, I=7003751502 | en_HK |
dc.identifier.scopusauthorid | Leung, ACM=23975896100 | en_HK |
dc.identifier.scopusauthorid | Guo, C=36462303300 | en_HK |
dc.identifier.citeulike | 7858546 | - |
dc.identifier.issnl | 0167-9236 | - |