<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A conceptual model and simulation model for phishing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gerd Wagner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Brandenburg University of Technology</institution>
          ,
          <addr-line>Konrad-Wachsmann-Allee 5, 03046 Cottbus</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We present a conceptual model for phishing, which is the basis of a simulation model, using the Object Event Modeling and Simulation approach. Both the conceptual model and the simulation model help to clarify the real-world semantics of phishing and provide a basis for more elaborate models, e.g., for capturing suitable concepts of trust and susceptibility or for capturing the organizational aspects needed for modeling spear phishing.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;conceptual phishing model</kwd>
        <kwd>phishing simulation model</kwd>
        <kwd>ontological grounding 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>1.
2.
3.
4.</p>
      <sec id="sec-1-1">
        <title>A phisher sends a lure message to phishing targets.</title>
        <p>Targets follow the deceptive link in the lure message leading to the phishing website.</p>
      </sec>
      <sec id="sec-1-2">
        <title>Targets provide exploitable data on a hook page of the phishing website.</title>
      </sec>
      <sec id="sec-1-3">
        <title>The phisher exploits the scammed data after obtaining it. This process description subsumes various messaging channels, such as email, texting, WhatsApp, etc., but the main phishing channel is email with deceptive links (which is the #1</title>
        <p>email threat category according to CloudFlare’s 2023 Phishing Threats Report, appearing in 35.6%
of their detections). While the main concept of phishing refers to this 4-step
informationstealing scenario, there is also a broader definition of phishing, which includes the case where
the target is tricked into downloading malicious software. In this paper, however, we restrict
our attention to the main concept of phishing.</p>
        <p>Phisher</p>
        <sec id="sec-1-3-1">
          <title>Exploit scammed data</title>
          <p>Send lure message to target</p>
        </sec>
        <sec id="sec-1-3-2">
          <title>Provide exploitable data</title>
        </sec>
        <sec id="sec-1-3-3">
          <title>Target</title>
        </sec>
        <sec id="sec-1-3-4">
          <title>Go to phishing website</title>
          <p>HHooookkWWeebbppaaggee</p>
          <p>In bulk phishing, which allows attacks using mass email lists with private email addresses,
a popular brand such as Microsoft, Adobe, DHL or Amazon, is used as the impersonated sender,
while in spear phishing, the attack is more personalized and therefore requires special
information about potential victims, including their professional email addresses.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Conceptual domain model</title>
      <p>
        In Object Event Modeling (OEM) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a conceptual domain model consists of a conceptual
information model, e.g., in the form of an Object Event (OE) Class Model, and a conceptual
process model, e.g., in the form of a BPMN Process Model.
      </p>
      <p>Since phishing is an interaction between phishers and their targets, we model phishers and
their targets as agents employing the agent concepts of OEM:</p>
      <p>Agents are special objects that interact with each other via communication and with
their inanimate environment via perception and action.</p>
      <p>Agents may perceive objects and events in their environment and, in response, take
certain actions. Perception events may lead to an update of the information state of the
perceiver. Action events may change the environment.</p>
      <p>A communication event is composed of two successive atomic events: an out-message
action event (corresponding to a message send action of the sender) and a correlated
open lure message body</p>
      <p>visit hook page
provide exploitable data</p>
      <p>exploit scammed data
in-message event (or message reception by the receiver). In-message events may lead
to an update of the information state of the receiver.</p>
      <p>Analyzing the phishing process sketched in Figure 1, we can identify the agent types
“phisher” and “phishing target”, the object types “lure message” and “hook page”, as well as the
(out-message) action and in-message/perception event types listed in Table 1.
*</p>
      <p>assets
receive lure message
read lure message header
read lure message body</p>
      <p>look at hook page
perceive exploitable data</p>
      <p>All these (agent, object and event) types, and the associations between them, are described
in the form of a conceptual OE class diagram shown in Figure 2.
«in-message event type»
receive lure message
«perception event type»
*read lure message header
(Out-Message) Action Event In-Message/Perception Event
send lure message
1
1</p>
      <p>1
*
«agent type»</p>
      <p>phisher
1
sender
1..*
1
«action type»
*open lure message body
«perception event type»
*read lure message body
«action type»
visit hook page
«perception event type»
look at hook page
*
*
*
*
*
*
*
receivers</p>
      <p>*
1..*
*</p>
      <p>targets
«agent type»
phishing target
assets
susceptibility
«out-message action type»
send lure message</p>
      <p>*
*
1
«object type»
lure message
impersonated agent
authenticity cues
influence technique cues
*
*
«perception event type»
perceive exploitable data</p>
      <p>«action type»
exploit scammed data
1</p>
      <p>1
«object type»</p>
      <p>hook page
impersonated agent</p>
      <p>For the participation associations between object types and event types, OE class models
show a history multiplicity at the side of the event types. For instance, for the association
between phishers and send lure message events, the multiplicity 1..* shown at the side of send
lure message events implies that over time, a phisher participates in one or many events of type
send lure message. By default, if it is not shown as a second multiplicity annotation of such an
association end, the snapshot multiplicity is 0..1, which means that at a time, a phisher may
participate in at most one send lure message event.</p>
      <p>By default, the event types in an OE class model are types of instantaneous events, which
implicitly have an attribute occurrence time.</p>
      <p>While the OE class model shown in Figure 2 describes the types of agents, objects and events
involved in a phishing scenario, the BPMN process diagram shown in Figure 3 describes the
possible sequences of events and their effects in such a scenario. It consists of two BPMN Pools,
one for agents of type phisher and one for agents of type phishing target. BPMN Pools are
container rectangles representing an agent type and including events and actions concerning
that agent type.</p>
      <p>In the diagram of Figure 3, we use the BPMN shape for “tasks” (rectangles with rounded
corners) for representing actions, and the shape for “signal events” (an Event circle with an
enclosed triangle) for representing perception events.</p>
      <p>The model of Figure 3 includes three trust-based decisions of the target: only if targets first
trust the lure message header data (sender address and subject line), and then trust the message
body and finally trust the hook page, they fall victim to the phishing attempt by providing
exploitable data.</p>
      <p>Notice that in this model the only event that affects the objects involved (by changing their
state) is exploit scammed data, which leads to a transfer of assets from the target to the phisher.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Phishing concepts</title>
      <p>The model of Figure 2 includes the following phishing-specific concepts and attributes:</p>
      <p>A phisher may be a private individual or an agent working for a criminal or state
organization.</p>
      <p>A phishing target may be a private individual or a person working for an organization.
The susceptibility of a phishing target denotes their behavioral disposition to be
victimized by a phishing attempt.</p>
      <p>A lure message has
a. an impersonated agent (such as Microsoft) as an alleged sender,
b. authenticity cues (such as the sender’s email address, spelling and grammar,
subject line and the domain name of the hook page) for signaling
trustworthiness,
c. influence technique cues (such as statements of urgency or authority) for pushing
the target to activate one of its deceptive links,
d. one or more deceptive links.</p>
      <p>A hook page also has an impersonated agent and authenticity cues for signaling
trustworthiness corresponding to those of the lure message.</p>
      <p>According to [2], the target’s level of attention to authenticity cues is negatively related,
while the level of attention to the influence technique cues is positively related, to the likelihood
to respond to phishing emails</p>
    </sec>
    <sec id="sec-4">
      <title>4. Ontological grounding of phishing concepts</title>
      <p>In [3], a Phishing Attack Ontology (PHATO) has been proposed. PHATO is grounded in the
Reference Ontology for Security Engineering (ROSE) [4] and the Common Ontology of Value and
Risk (COVER) [5], which are both founded on the Unified Foundational Ontology (UFO) [6].</p>
      <sec id="sec-4-1">
        <title>PHATO covers most of the concepts listed in the previous section, except for</title>
      </sec>
      <sec id="sec-4-2">
        <title>1. the susceptibility of targets,</title>
      </sec>
      <sec id="sec-4-3">
        <title>2. authenticity cues of lure messages and hook pages,</title>
      </sec>
      <sec id="sec-4-4">
        <title>3. influence technique cues of lure messages.</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Simulation design model and implementation</title>
      <p>An information design model in the form of an OE class design model on the basis of the
conceptual information model of Figure 1 is shown in Figure 4.</p>
      <p>A simulation design model is obtained from the conceptual model by making certain
simplifications (such as dropping irrelevant elements) and by enriching it with computational
details such that the result is a computationally complete model (an executable specification).
A simulation design model consists of an information design model and a process design model.</p>
      <p>An information design model in the form of an OE class model defines a number of classes
(for object and event types) that can be implemented with an Object-Oriented simulation
language such as OESjs [7], which is a JavaScript-based framework for Object Event Simulation.
1
1
sender
«agent type»</p>
      <p>Phisher
assets : Integer
1
receiver
«in-message event type»</p>
      <p>ReceiveLureMessage
1
*</p>
      <p>*
1
*
*</p>
      <p>*
«action type»</p>
      <p>VisitHookPage
«perception event type»</p>
      <p>LookAtHookPage</p>
      <p>«action type»
ProvideExploitableData
*
*
*
«object type»</p>
      <p>HookPage
impersonatedAgent : String</p>
      <p>In the OE class design model of Figure 4, the susceptibility attribute of phishing targets has
been modeled as a decimal-valued attribute holding a probability value, while for simplicity the
attributes authenticity cues and influence technique cues of lure messages have been dropped.</p>
      <p>An OESjs implementation of this simulation design model is available at
https://gwagner57.github.io/oes/phishing-1.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>We have presented a conceptual model for (agent-based) phishing simulation, which is the basis
of a simulation design that has been implemented with the simulation framework OESjs. We
have also briefly discussed how to obtain an ontological grounding of the phishing concepts
included in our conceptual model with UFO, pointing out some open issues.</p>
      <p>Both the conceptual model and the simulation design model provide a basis for more
sophisticated models, which may aim to capture elaborate concepts of the susceptibility of
targets related to their trust in messages and websites or the organizational aspects needed for
modeling spear phishing.</p>
      <sec id="sec-6-1">
        <title>Modeling and</title>
      </sec>
      <sec id="sec-6-2">
        <title>Simulation,</title>
        <p>[2] A. Vishwanath et al, ”Why do people get phished? Testing individual differences in
phishing vulnerability within an integrated, information processing model”, Decision
Support Systems 51 (2011) 576–586.
[3] Í. Oliveira, R.F. Calhau, G. Guizzardi, Toward a phishing attack ontology, ER2023:
Companion Proceedings of the 42nd International Conference on Conceptual Modeling:</p>
      </sec>
      <sec id="sec-6-3">
        <title>ER Forum, 7th SCME, November, 2023, Lisbon, Portugal.</title>
        <p>[4] Í. Oliveira, T. P. Sales, R. Baratella, M. Fumagalli, G. Guizzardi, An ontology of security
from a risk treatment perspective, in: International conference on conceptual modeling,
Springer, 2022, pp. 365–379.
[5] T. P. Sales, F. Baião, G. Guizzardi, J. P. A. Almeida, N. Guarino, J. Mylopoulos, The common
ontology of value and risk, in: Conceptual Modeling. ER 2018, volume 11157, Springer,
2018, pp. 121–135.
[6] G. Guizzardi, A. Botti Benevides, C. M. Fonseca, D. Porello, J. P. A. Almeida, T. P. Sales,</p>
      </sec>
      <sec id="sec-6-4">
        <title>UFO: Unified Foundational Ontology, Applied Ontology 17 (2022) 1–44.</title>
        <p>[7] G. Wagner, Object Event Simulation with OESjs, URL:
https://sim4edu.com/reading/desengineering/es-with-oesjs</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wagner</surname>
          </string-name>
          , Object Event https://sim4edu.com/reading/OEMS.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>