{"id":"https://openalex.org/W4406461453","doi":"https://doi.org/10.1109/bigdata62323.2024.10825018","title":"Next-Generation Phishing: How LLM Agents Empower Cyber Attackers","display_name":"Next-Generation Phishing: How LLM Agents Empower Cyber Attackers","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406461453","doi":"https://doi.org/10.1109/bigdata62323.2024.10825018"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114761645","display_name":"Khalifa Afane","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Khalifa Afane","raw_affiliation_strings":["Fordham University,Department of Computer and Information Sciences,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069331320","display_name":"Wenqi Wei","orcid":"https://orcid.org/0000-0001-9177-114X"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenqi Wei","raw_affiliation_strings":["Fordham University,Department of Computer and Information Sciences,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115592306","display_name":"Ying Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ying Mao","raw_affiliation_strings":["Fordham University,Department of Computer and Information Sciences,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082877482","display_name":"Junaid Farooq","orcid":"https://orcid.org/0000-0003-0618-9345"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junaid Farooq","raw_affiliation_strings":["University of Michigan-Dearborn,Department of Electrical and Computer Engineering,Dearborn,MI,USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan-Dearborn,Department of Electrical and Computer Engineering,Dearborn,MI,USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075347539","display_name":"Juntao Chen","orcid":"https://orcid.org/0009-0001-3883-548X"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Juntao Chen","raw_affiliation_strings":["Fordham University,Department of Computer and Information Sciences,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA","institution_ids":["https://openalex.org/I164389053"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114761645"],"corresponding_institution_ids":["https://openalex.org/I164389053"],"apc_list":null,"apc_paid":null,"fwci":15.4311,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.98991643,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2558","last_page":"2567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8354976177215576},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6859182119369507},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6432732343673706},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5085183382034302},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2762451171875},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24324706196784973}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8354976177215576},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6859182119369507},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6432732343673706},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5085183382034302},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2762451171875},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24324706196784973}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W150462035","https://openalex.org/W2113449956","https://openalex.org/W2160353917","https://openalex.org/W2161983758","https://openalex.org/W2910306234","https://openalex.org/W3000274722","https://openalex.org/W3045615754","https://openalex.org/W3160638507","https://openalex.org/W3184796286","https://openalex.org/W3205068155","https://openalex.org/W4240840618","https://openalex.org/W4247348637","https://openalex.org/W4281557260","https://openalex.org/W4306294746","https://openalex.org/W4310230601","https://openalex.org/W4322718191","https://openalex.org/W4362678805","https://openalex.org/W4376312605","https://openalex.org/W4386978016","https://openalex.org/W4391769266","https://openalex.org/W4391833078","https://openalex.org/W4392340288","https://openalex.org/W4392353733","https://openalex.org/W4392667162","https://openalex.org/W4399412887","https://openalex.org/W4400315206","https://openalex.org/W4400527243","https://openalex.org/W4401066072","https://openalex.org/W4402811916","https://openalex.org/W6802669662","https://openalex.org/W6838865847","https://openalex.org/W6845718872","https://openalex.org/W6850625674","https://openalex.org/W6850702068","https://openalex.org/W6851531982","https://openalex.org/W6851985269","https://openalex.org/W6856685690","https://openalex.org/W6861190020","https://openalex.org/W6862701179","https://openalex.org/W6871690551","https://openalex.org/W6906460482"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260"],"abstract_inverted_index":{"The":[0],"escalating":[1],"threat":[2,131,204],"of":[3,13,37,49,89,164,189],"phishing":[4,28,39,51,81,92,127,156,177,193],"emails":[5,118],"has":[6],"become":[7],"increasingly":[8],"sophisticated":[9],"with":[10],"the":[11,35,86,130,137,162,187,197],"rise":[12],"Large":[14],"Language":[15],"Models":[16],"(LLMs).":[17],"As":[18,129],"attackers":[19],"exploit":[20],"LLMs":[21,90,173,190],"to":[22,33,149,161,174,191],"craft":[23],"more":[24,165,200],"convincing":[25],"and":[26,60,72,79,105,143,195,202],"evasive":[27],"emails,":[29],"it":[30],"is":[31],"crucial":[32],"assess":[34],"resilience":[36],"current":[38,126],"defenses.":[40,128],"In":[41],"this":[42],"study":[43,159],"we":[44],"conduct":[45],"a":[46,95],"comprehensive":[47],"evaluation":[48],"traditional":[50,78],"detectors,":[52,121],"such":[53],"as":[54,62,64,91],"Gmail":[55],"Spam":[56],"Filter,":[57],"Apache":[58],"SpamAssassin,":[59],"Proofpoint,":[61],"well":[63],"machine":[65],"learning":[66],"models":[67],"like":[68,101],"SVM,":[69],"Logistic":[70],"Regression,":[71],"Naive":[73],"Bayes,":[74],"in":[75,113,125,153],"identifying":[76],"both":[77],"LLM-rephrased":[80],"emails.":[82],"We":[83],"also":[84],"explore":[85],"emerging":[87],"role":[88],"detection":[93,114,205],"tools,":[94],"method":[96],"already":[97],"adopted":[98],"by":[99,171],"companies":[100],"NTT":[102],"Security":[103],"Holdings":[104],"JPMorgan":[106],"Chase.":[107],"Our":[108],"results":[109],"reveal":[110],"notable":[111],"declines":[112],"accuracy":[115],"for":[116,139,183,199],"rephrased":[117],"across":[119],"all":[120],"highlighting":[122],"critical":[123],"weaknesses":[124],"landscape":[132],"evolves,":[133],"our":[134],"findings":[135],"underscore":[136],"need":[138],"stronger":[140],"security":[141],"controls":[142],"regulatory":[144],"oversight":[145],"on":[146],"LLM-generated":[147],"content":[148],"prevent":[150],"its":[151],"misuse":[152],"creating":[154],"advanced":[155],"attacks.":[157],"This":[158],"contributes":[160],"development":[163],"effective":[166],"Cyber":[167],"Threat":[168],"Intelligence":[169],"(CTI)":[170],"leveraging":[172],"generate":[175],"diverse":[176],"variants":[178],"that":[179],"can":[180],"be":[181],"used":[182],"data":[184],"augmentation,":[185],"harnessing":[186],"power":[188],"enhance":[192],"detection,":[194],"paving":[196],"way":[198],"robust":[201],"adaptable":[203],"systems.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
