skip to main content
10.1145/1595676.1595686acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

A profitless endeavor: phishing as tragedy of the commons

Published:22 September 2008Publication History

ABSTRACT

Conventional wisdom is that phishing represents easy money. In this paper we examine the economics that underly the phenomenon, and find a very different picture. Phishing is a classic example of tragedy of the commons, where there is open access to a resource that has limited ability to regenerate. Since each phisher independently seeks to maximize his return, the resource is over-grazed and yields far less than it is capable of. The situation stabilizes only when the average phisher is making only as much as he gives up in opportunity cost.

Since the picture we paint is at variance with accepted wisdom we check against several publicly available data sources on phishing. We find the oft-quoted survey-based estimates of phishing losses unreliable. In particular the victimization rate found in most surveys is smaller than the margin of error, and dollar losses are estimated by averaging unverified self-reported numbers. We estimate that recent public estimates over-state phishing losses by as much as a factor of fifty.

This economic portrait illuminates our enemy in an entirely new light. Far from being a path to riches, phishing appears to be a low-skill low-reward business. The enormous amount of phishing activity is evidence of its failure to deliver riches rather than its success, as phishers send more and more email hoping for their share of the bounty that eludes them. Repetition of questionable survey results and unsubstantiated anecdotes makes things worse by ensuring a steady supply of new entrants.

References

  1. http://ha.ckers.org/blog/20070508/phishing-social-networking-sites/.Google ScholarGoogle Scholar
  2. http://en.wikipedia.org/wiki/Overgrazing.Google ScholarGoogle Scholar
  3. http://www.darkreading.com/document.asp?doc id=116574&f src=darkreading section 296.Google ScholarGoogle Scholar
  4. http://fisherieseconomics.googlepages.com/openaccess.Google ScholarGoogle Scholar
  5. http://www.slate.com/id/2144508/.Google ScholarGoogle Scholar
  6. A. Odlyzko. Internet traffic growth: Sources and implications. Proceedings of SPIE, 2003.Google ScholarGoogle Scholar
  7. J. Conybeare and T. Sandler. State-sponsored Violence as a Tragedy of the Commons: England's Privateering Wars with France and Spain, 1625--1630. Public Choice, 1993.Google ScholarGoogle Scholar
  8. Federal Trade Commission. Identity Theft Survey Report. 2003. http://www.ftc.gov/os/2003/09/synovatereport.pdf.Google ScholarGoogle Scholar
  9. Federal Trade Commission. Identity Theft Survey Report. 2007. www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf.Google ScholarGoogle Scholar
  10. D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. WWW 2007, Ban®. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ford R., and Gordon S. Cent, Five Cent, Ten Cent, Dollar: Hitting Spyware where it Really Hurt. NSPW, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gartner. Identity Theft Survey Report. 2005. http://www.gartner.com/press releases/asset 129754 11.html.Google ScholarGoogle Scholar
  13. Gartner. Phishing Survey. 2006. http://www.gartner.com/it/page.jsp?id=498245.Google ScholarGoogle Scholar
  14. Gartner. Phishing Survey. 2007. http://www.gartner.com/it/page.jsp?id=565125.Google ScholarGoogle Scholar
  15. H.S. Gordon. The Economic Theory of a Common-Property resource: The Fishery. Journal of Political Economy, 1954.Google ScholarGoogle ScholarCross RefCross Ref
  16. G. Hardin. The Tragedy of the Commons. Science, 1968.Google ScholarGoogle Scholar
  17. J. Franklin and V. Paxson and A. Perrig and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proc. CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Javelin. Identity Theft Survey Report. 2003. http://www.javelinstrategy.com/uploads/505.RF Phishing.pdf.Google ScholarGoogle Scholar
  19. M. Jakobsson and J. Ratkiewicz. Designing Ethical Phishing Experiments: A Study of (ROT13) rOnl Query Features. Proc. WWW, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P.A. Neher. The Pure Theory of Muggery. American Economic Review, 1978.Google ScholarGoogle Scholar
  21. P. Ohm. The Myth of the Superuser: Fear, Risk, and Harm Online. UC Davis Law Review, 2008.Google ScholarGoogle Scholar
  22. Anti-Phishing Working Group. http://www.antiphishing.org.Google ScholarGoogle Scholar
  23. R. Thomas and J. Martin. The Underground Economy: Priceless. Usenix ;login:, 2006.Google ScholarGoogle Scholar
  24. P. Reuter. The (continued) Vitality of Mythical Numbers. Public Interest, 1987.Google ScholarGoogle Scholar
  25. S. Iudicello and M. Weber and R. Wieland. Fish, Markets and Fishermen: the Economics of Overfishing. Island Press, 1999.Google ScholarGoogle Scholar
  26. S.D. Levitt and S.J. Dubner. Freakonomics: A Rogue Economist Explores the Hidden Side of Everything. William Morrow, 2005.Google ScholarGoogle Scholar
  27. M. Singer. The Vitality of Mythical Numbers. Public Interest, 1971.Google ScholarGoogle Scholar
  28. T. Moore and R. Clayton. Examining the Impact of Website Take-down on Phishing. Proc. APWG eCrime Summit, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. TrustE. Phishing Survey. 2004. http://www.truste.org/about/press release/09 29 04.php.Google ScholarGoogle Scholar

Index Terms

  1. A profitless endeavor: phishing as tragedy of the commons

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      NSPW '08: Proceedings of the 2008 New Security Paradigms Workshop
      August 2009
      144 pages
      ISBN:9781605583419
      DOI:10.1145/1595676

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 September 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate62of170submissions,36%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader