Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks
Round 1
Reviewer 1 Report
This study focuses on evaluating the level of cybersecurity knowledge and cyber awareness in Saudi Arabia. It is aimed at assessing end-user susceptibility through three phishing attack simulations. Furthermore, they elaborate on some of the concepts related to phishing attacks and review the steps required to launch such attacks. However, they do not consider any machine learning-based analysis, although many works have been done in these areas. For your references, you can consider the machine learning based techniques.
Cybersecurity Data Science: An Overview from Machine Learning Perspective, Journal of Big Data, UK, Springer.
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system, Information Sciences, Elsevier.
Machine learning based phishing detection from URLs, Expert Systems with Applications, Elsevier
So on ....
Although, they mentioned to design and develop a machine-learning-based algorithm in the future, however, an analysis with machine learning can improve the paper.
A Discussion Section with summarizing their findings might be helpful.
Author Response
Dear Reviewer,
Thank you for the thoughtful and rigorous reviews. We have highlighted the improvements according to each reviewer comment in the attached file, and we believe the changes have improved the clarity of the manuscript. We hope our work address all of the points raised, and look forward to your response to our revision.
Kind regards,
Author Response File: Author Response.docx
Reviewer 2 Report
The methodology and the structure of paper is very good. The case presented is studied in deep and could be an interesting read for technicians and researcher.
Author Response
Dear Reviewer,
Thank you for the thoughtful and rigorous reviews. We have highlighted the improvements according to each reviewer comment in the attached file, and we believe the changes have improved the clarity of the manuscript. We hope our work address all of the points raised, and look forward to your response to our revision.
Kind regards,
Author Response File: Author Response.docx
Reviewer 3 Report
The authors of this paper focused on phishing and study the people’s behavior using three different phishing attacks, cloning a popular website, using email phishing, and spreading a phishing message through social networks. They performed their experiments in Saudi Arabia and as expected, due to the low awareness of the people their attacks started with a lot of success which was decaying over time.
This is an interesting work that demonstrates a use case. However, there are some issues that I would like to raise with the authors.
The paper needs extensive proofreading. The last contribution is obviously broken due to last-minute editing.
Figures 1 and 2 are not readable and not needed. The text explanation is enough.
The related work is nonexistent. The authors should provide information about the related literature as there is already a study about phishing emails in Saudi Arabia (Alseadoon, I., Chan, T., Foo, E., & Gonzalez Nieto, J. (2012). Who is more susceptible to phishing emails?: a Saudi Arabian study.)
Additionally, at the end of the literature review, the authors should compare and contrast their work with the literature through a table, highlighting their novelties.
When the authors formed a phishing domain they used combosquatting (Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., ... & Antonakakis, M. (2017, October). Hiding in plain sight: A longitudinal study of combosquatting abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 569-586).)
Figures 3 and 4 should be placed next to each other
As their technique aims at increasing the awareness of people, the attacks should be launched twice to the same people, to show the results of this process and how they react to similar threats.
The security evaluation section does not offer any real evaluation. It should be renamed to the discussion of results.
The future work that mentions the game which is aiming for increasing the cyber awareness already exists in the literature.
Author Response
Dear Reviewer,
Thank you for the thoughtful and rigorous reviews. We have highlighted the improvements according to each reviewer comment in the attached file, and we believe the changes have improved the clarity of the manuscript. We hope our work address all of the points raised, and look forward to your response to our revision.
Kind regards,
Author Response File: Author Response.docx
Round 2
Reviewer 1 Report
The authors need to answer for each specific comment mentioning how they address in their paper. However, found no answer to the previous comments.
Author Response
Dear Reviewer,
Please find attached the responses to your comments.
Kind regards,
Author Response File: Author Response.pdf
Reviewer 3 Report
The authors seem to have addressed every comment.
Author Response
Dear Reviewer,
Thank you for your prompt feedback. As for the language editing, we just want to point out that we did use Elsevier lanuage Editing service before (the invoice is attached). Apprarently, the service provided was not satisfactory. Instead, we will use the author services provided by MDPI once all the editing approved.
Kind regards,
Author Response File: Author Response.pdf
Round 3
Reviewer 1 Report
Although the authors respond "That is why we added in the future works because we are planning to take courses and learn more how to use machine
learning in cybersecurity. The article you mentioned above could help us as starting point to navigate our way to AI and machine learning.", however, this is not convincing. AI/ML is the latest technology to handle cybersecurity threats (ref paper is below). Need to highlight some of this according to this. The authors can highlight in the Discussion section/or others as well.
Cybersecurity Data Science: An Overview from Machine Learning Perspective, Journal of Big Data, UK, Springer
Machine learning-based phishing detection from URLs, Expert Systems with Applications, Elsevier
Author Response
Dear Reviewer,
Kindly find attached the file addressing your comments.
Kind regards,
Author Response File: Author Response.pdf