Мethod of analysis for analyzing phishing messages

Authors

  • Artem Zhylin Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-4959-612X
  • Olha Shevchuk Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-2866-439X

DOI:

https://doi.org/10.20535/2411-1031.2022.10.1.261176

Keywords:

phishing, cyber fraud, phishing messages, classification of phishing attacks, method of analysis

Abstract

The development and widespread introduction of the Internet into everyday life has transformed both economic and social relations. The representation of these relations in digital form has created a digital economy, characterized by an active exchange of information, quick access to information resources, and the transfer of payments to the digital dimension. Social relations in the digital world are represented by social networks, instant messengers, which also provide economic services. At the same time, the new space, the transformed economy and social relations give rise to new threats. Users themselves actively expose information about themselves and their loved ones, photos of vacations and locations to the public. In addition to social networking, viewing entertainment content and online games, bank settlement transactions are popular. The popularization of Internet banking leads to an increased interest in stealing data from intruders. The result of this is an increase in the number of scammers who aim to obtain confidential user information. In addition, since the beginning of the war, the number of cyber attacks on public authorities, critical information infrastructure facilities and organizations containing critical information has increased. One of the well-known methods of stealing such information is phishing attacks. At the same time, most users underestimate the severity of these attacks and do not pay enough attention to protection systems. This, in turn, leads to wider consequences. Therefore, the problem to be solved is to present a method for analyzing phishing messages that can be used to reduce the probability of reaching the goal of a phishing attack. At the same time, it is known that attackers improve and modify the methods of implementing attacks, and therefore, classifying phishing attacks to increase user awareness is an urgent task. The result of the work is the proposed classification of phishing attacks and the presented method for analyzing phishing messages.

Author Biographies

Artem Zhylin, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

сandidate of technical sciences, associate professor, professor at the cybersecurity and application of information systems and technology academic department

Olha Shevchuk, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

сandidate of technical sciences, associate professor, professor at the cybersecurity and application of information systems and technology academic department

References

Attack on the information front, 2022. [Online]. Available: https://cyberpolice.gov.ua/news/ataka-na-informaczijnomu-fronti---porady-kiberpolicziyi-shhodo-zaxystu-gadzhetiv-vid-vytoku-danyx-6563/. Accessed on: Jan. 3, 2022.

Cyberpolice has stopped the activities of fraudsters, 2022. [Online]. Available: https://cyberpolice.gov.ua/news/u--roczi-kiberpolicziya-prypynyla-diyalnist--onlajn-shaxrayiv-6518/?fbclid=IwAR0RaghjZSzEzytXJ1RARnhVcWEq9IzPKgZIKj3ydsY8QgOaRgqSvEaifl8. Accessed on: Jan. 3, 2022.

Quarterly threat trends & intelligence report November, 2021. [Online]. Available: https://www.phishlabs.com/blog/new-quarterly-threat-trends-intelligence-report-now-available/. Accessed on: Febr. 4, 2022.

S. Dumchikov, and V. Luchikov, “Statistics of phishing incidents in Ukraine in 2021”, 2021. [Online]. Available: https://ir.lib.vntu.edu.ua/bitstream/handle/123456789/34523/91970.pdf?sequence=2&isAllowed=y. Accessed on: Jan. 3, 2022.

PhishTank. [Online]. Available: https://www.phishtank.com/what_is_phishing.php. Accessed on: Jan. 4, 2022.

C. Whittaker, “Large-scale automatic classification of phishing pages”, 2013. [Online]. Available: https://research.google.com/pubs/archive/35580.pdf. Accessed on: Jan. 5, 2022.

Phishing Activity Trends Report, 1st Quarter, 2019. [Online]. Available: http://docs.apwg.org/reports/apwg_trends_report_q1_2019.pdf. Accessed on: Jan. 4, 2022.

M. Akulich, “Phishing and Marketing”, 2022. [Online]. Available: https://books.google.com.ua/books?id=BLsVEAAAQBAJ&printsec=frontcover&hl=ru#v=onepage&q&f=false. Accessed on: Jan. 3, 2022.

What is phishing and how to protect yourself from it. [Online]. Available: https://www.fg.gov.ua/articles/50140-shcho-take-fishing-i-yak-vid-nogo-zahistitis.html. Accessed on: Febr. 3, 2022.

What is spam. [Online]. Available: https://www.eset.com/ua/support/information/entsiklopediya-ugroz/spam/. Accessed on: Febr. 3, 2022.

M. Khonji, Y. Iraqi, аnd A. Jones, “Phishing Detection: A Literature Survey”, IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2091-2121, 2013. [Online]. Available: https://doi.org/10.1109/surv.2013.032213.00009. Accessed on: Jan. 5, 2022.

I. Yakovyuk, A. Voloshin, and A. Shovkun, “Legal aspects of combating phishing: the experience of the European Union”, Problems of legality, no. 149, pp. 16, 2020.

D. Davydov, “Software for the system of forming filters against phishing on the Internet”. [Online]. Available: http://dspace.kntu.kr.ua/jspui/bitstream/123456789/4088/1/ConferenceMITandCompSysS2013_p89.pdf. Accessed on: Jan. 10, 2022.

O. Boskin, and P. Chorny, “Analysis of the threat of phishing”, in Modern youth in the world of information technology, N. Kirichenko and G. Dimova, Ed. Kherson, Ukraine: Kherson, 2021, pp. 179-181. [Online]. Available: http://dspace.ksau.kherson.ua/bitstream/handle/. Accessed on: Jan. 10, 2022.

O. Boskin, and P. Chorny, “Analysis of protection against phishing”, in Modern youth in the world of information technology, N. Kirichenko and G. Dimova, Ed. Kherson, Ukraine: Kherson, 2021, pp. 182-183. [Online]. Available: https://dspace.ksau.kherson.ua/bitstream/handle/. Accessed on: Jan. 10, 2022.

A. Jain Kumar, “Phishing Detection: Analysis of Visual Similarity Based Approaches”. [Online]. Available: https://www.researchgate.net/publication/312205924_Phishing_Detection_Analysis_of_Visual_Similarity_Based_Approaches. Accessed on: Febr. 4, 2022.

D. Gupta, “Comparison of classification algorithms to detect phishing web pages using feature selection and extraction”. [Online]. Available: https://pdfs.semanticscholar.org/fccd/8ff23734a1947d3efc14d3df9863a5efac6c.pdf. Accessed on: Jan. 4, 2022.

Anatomy of phishing, 2020. [Online]. Available: https://blog.avast.com/ru/the-anatomy-of-a-phish-avast. Accessed on: Jan. 10, 2022.

All about phishing. [Online]. Available: https://ru.malwarebytes.com/phishing/. Accessed on: Jan. 10, 2022.

Do-it-yourself Phishing, 2017. [Online]. Available: https://habr.com/ru/company/aktiv-company/blog/329470/. Accessed on: Jan. 9, 2022.

T. Dakpa, “Study of Phishing Attacks and Preventions”, International Journal of Computer Applications, vol. 163, no. 2, pp. 5-8, 2017. [Online]. Available: https://www.ijcaonline.org/archives/volume163/number2/dakpa-2017-ijca-913461.pdf. Accessed on: Jan.14, 2022.

Published

2022-06-30

How to Cite

Zhylin, A., & Shevchuk, O. (2022). Мethod of analysis for analyzing phishing messages. Collection "Information Technology and Security", 10(1), 72–82. https://doi.org/10.20535/2411-1031.2022.10.1.261176

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION