Download PDFOpen PDF in browser

Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform

8 pagesPublished: August 21, 2025

Abstract

With the development of the digital society, phishing attacks have become an increasingly serious cybersecurity threat, posing risks not only to general users but also serving as a common initial intrusion method in Advanced Persistent Threat (APT) attacks. In this study, we simulated a phishing attack targeting the Moodle system of National Taiwan Normal University and collected 104 valid survey responses to investigate phishing website recognition behaviors. The results indicate that checking the URL is one of the most effective methods for users to identify phishing websites. In the future, we plan to develop a browser extension integrated with Large Language Models (LLMs) to automatically detect high-risk phishing websites and provide real-time warnings to users, thereby enhancing overall protection capabilities.

Keyphrases: phishing, phishing detection, phishing simulation, social engineering, url

In: Akira Yamada, Huy Kang Kim, Yujue Wang and Tung-Tso Tsai (editors). Proceedings of the 20th Asia Joint Conference on Information Security, vol 106, pages 114-121.

BibTeX entry
@inproceedings{AsiaJCIS2025:Phishing_Attack_Simulation_Detection,
  author    = {Yao Yu Lee and Albert Guan},
  title     = {Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/WK6X},
  doi       = {10.29007/58hg},
  pages     = {114-121},
  year      = {2025}}
Download PDFOpen PDF in browser