A Comprehensive Reexamination of Phishing Research from the Security Perspective Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh Verma, and Arthur Dunbar

Total Page:16

File Type:pdf, Size:1020Kb

A Comprehensive Reexamination of Phishing Research from the Security Perspective Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh Verma, and Arthur Dunbar REEXAMINING PHISHING RESEARCH 1 SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh Verma, and Arthur Dunbar Abstract—Phishing and spear phishing are typical examples of is also available in the form of instant messaging applications, masquerade attacks since trust is built up through impersonation chat services, etc. for the attack to succeed. Given the prevalence of these attacks, The persistent popularity of phishing and spear phishing considerable research has been conducted on these problems along multiple dimensions. We reexamine the existing research on with attackers [1], [2], comes from the fact that they exploit phishing and spear phishing from the perspective of the unique the human element (“weakest link”) [3] and do not require any needs of the security domain, which we call security challenges: actual intrusion into the system or network. Phishing/spear real-time detection, active attacker, dataset quality and base- phishing attacks have been successfully used to bring well- rate fallacy. We explain these challenges and then survey the protected companies to their knees (e.g., the attack on RSA as existing phishing/spear phishing solutions in their light. This viewpoint consolidates the literature and illuminates several described in [4]) and estimates of losses from phishing alone opportunities for improving existing solutions. We organize the run into several hundred million dollars in the US. In addition existing literature based on detection techniques for different to the monetary loss, there is also a loss of time, productivity, attack vectors (e.g., URLs, websites, emails) along with studies on and damage to reputation. Besides stealing sensitive informa- user awareness. For detection techniques we examine properties tion, email attachment and web links in the emails are the most of the dataset, feature extraction, detection algorithms used, and performance evaluation metrics. This work can help guide common way of spreading malware, for example, 9 out of 10 the development of more effective defenses for phishing, spear phishing emails detected in Verizon network on March 2016 phishing and email masquerade attacks of the future, as well as carried ransomware [5]. Previous phishing studies have found provide a framework for a thorough evaluation and comparison. that phishing is “far more successful than commonly thought” and it is the main mechanism for manual account hijacking Index Terms—Phishing, spear phishing, usable security, email, [1], [6]. website, URL, dataset properties, unique challenges of security Despite more than a decade of research on phishing, it still continues to be a serious problem. There could be several reasons for this: the problem itself may be intractable, I. INTRODUCTION the technical approaches so far may have missed important Internet users continue to be plagued by many attacks, parameters of the problem, phishing exploits the human as which include: spam, phishing, spear phishing, masquerade, the weakest link so purely technical approaches may not be and malware delivery. Spam is an advertisement and its most sufficient, or some combination of these. To expose the reasons pernicious effect is the loss of time and productivity. Phishing for the continued success of phishing, we survey the detection and spear phishing are more damaging. In these attacks, the literature and user studies on phishing and spear phishing. attacker impersonates a trusted entity with an intent to steal We found that researchers have tackled phishing/spear sensitive information or the digital identity of the target, e.g., phishing in many papers, and there are several surveys of account credentials, credit card numbers, etc. The difference these attempts. However, we discovered that there are certain arXiv:1911.00953v1 [cs.CR] 3 Nov 2019 between them is that spear phishing is more targeted and methodological issues with phishing detection research. For phishing is more indiscriminate. Both of them are cases of example, we notice: masquerade attacks which involve impersonation. However, • The use of balanced datasets and inappropriate metrics this type of attack (masquerade) tends to have broader objec- • Unreported training and testing times tives. Examples include: planting fake news, sowing divisions • Lack of generalization studies in communities (e.g., the case of WhatsApp in India), and • Also in user studies, we find the multiple comparison swaying opinions (e.g., the case of stealing elections). The issue phrase malware delivery is self-explanatory. Many surveys have missed quite a few of these issues, e.g., Email continues to be one of the most convenient and popu- the dataset diversity issue is never mentioned. Challenges such lar vectors of choice for the above attacks. An email is usually as base-rate fallacy, active attacker and generalization studies, embedded with a poisoned link to a fraudulent website set up which we collectively call “security challenges” are rarely to trick the victim. However, with the growing popularity of mentioned, let alone emphasized. We identify the required set social networks, a new medium for spreading malicious links of challenges in cybersecurity based on those outlined in [2], [7]. All the authors are with the Department of Computer Science, University of Houston, TX, 77204 USA. e-mail: {rverma, adas5, sbaki2, aelaassal}@uh.edu c 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. REEXAMINING PHISHING RESEARCH 2 Our goal is to reinvigorate research on these problems and spear phishing attacks. According to DBLP (Digital Bibliog- reorient it towards solving the urgent, practical needs of the raphy & Library Project), the first phishing papers appeared security domain [2]. Hence, we reexamine the previous litera- in 2004,1 and there are 732 papers from 2004-2017.2 For ture on phishing and spear phishing from the viewpoint of the comparison, a publication search with keyword ‘spam’ on unique needs of the security domain, which we elaborate upon DBLP yields 2,213 papers (the query, ‘spam$’, exact word in Section IV, to determine the appropriateness of the proposed match for spam, yielded 1,785 papers), but this is an estimate, solutions. To our knowledge, a comprehensive evaluation of since it includes opinion/review spam papers and also more the appropriateness of the previous research on phishing and than 100 matches with author last name “Spampinato.” spear phishing from the security perspective has not been done To gather the research papers for this study, at first we used before. A better understanding of the previous studies in this the queries “phish URL, phish link, phish site, phish web, phish light will foster research on effective and practical defenses email/e-mail” independently on four databases: DBLP, ACM for these problems. Such a perspective will also provide a Digital Library, IEEE Xplore, and Google Scholar (allintitle framework for a thorough evaluation of current and future query). We also found many papers that study phishing as solutions. User studies are also important for stopping the part of malicious and malware centric behavior. Therefore, phishing attacks since attackers try to elude computer users. we added the following additional queries (without quotes) - No matter how good the detection system works, end users “malware URL, malicious URL, malware link, malicious link, should be prepared for the different types of attacks. So, malware site, malicious site, malware email/e-mail, malicious we also review the phishing user studies in addition to the email/e-mail.” However, we only consider research specific to detection techniques. We observed that there are quite a few phishing attack vectors – URL, email and websites. Papers existing surveys on phishing emails, significantly fewer on which propose mainly malware detection techniques are be- phishing websites and Uniform Resource Locators (URLs), yond the scope of this survey. To search for relevant literature and none on user studies. However, we did not find any survey on spear phishing, we used the queries “spear phishing” (this on phishing or spear phishing that emphasized the unique query also covers spear-phishing) and “spearphishing.” The needs of the security domain and examined the research from queries “spear phish” and “spearphish” did not yield any this perspective. Our contributions are as follows: additional results. Later, we realized that authors sometimes • We adapt the security challenges in cybersecurity [2], [7] just use “phishing detection” or “phishing attack,” or some to the field of detecting phishing URLs, websites, emails other variation. So we expanded our search using “phish” and and user studies. “phishing” to the above databases. • We collect and review a comprehensive list of literature For this paper, we mainly focus on research published on phishing and spear phishing detection systems as well between the years 2010-2017. We cover papers appearing up as user studies. to March 2018, and any pre-2010 paper that is highly cited • We conduct a systematic review of the phishing detection or appeared in a major security venue. We also cover
Recommended publications
  • GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60Fps HFR, 4.3X Optical Zoom, IR Leds, Indoor/Outdoor
    FCS-3406 Version: 1 GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60fps HFR, 4.3X Optical Zoom, IR LEDs, Indoor/Outdoor The LevelOne FCS-3406 is a fixed-position outdoor camera offering an ultra-reliable, cost-effective solution for outdoor IP surveillance networks, and is rated at IP67 to operate within rain, extreme heat, snow, dust and humid conditions. Offering clear, sharp imagery with 2-Megapixel resolution and the versatility of 802.3af standard PoE to transfer power and data via a single Cat.5 cable, the LevelOne FCS-3406 should be an essential part of any security deployment that requires smart, reliable outdoor cameras. Key Features - 60 fps High Frame Rate (HFR) video in 1080p - Video compression: H.264, H.265 - Supports 4.3X optical zoom - Features WDR (Wide Dynamic Range) to enhance visibility under extremely bright or dark environments - Vandal-proof IK10-rated housing - Weatherproof IP67-rated housing - Built-in infrared LEDs for night viewing up to 30m - Built-in Micro SDHC/SDXC card slot for local storage Specifications System Specifications Standards: TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, PPPoE, NTP, UPnP, SMTP,SNMP,IGMP, 802.1X, QoS, IPv6, Bonjour Image Sensor: 1/1.8" Progressive Scan CMOS Lens: 2.8 to 12 mm motorization Port: 10/100Mbps (100Base-T) RJ45 Ethernet interface Power Connector Audio:In/Out I/O terminal block (1 DI/1 DO) 1 x MicroSDHC/ MicroSDXC card slot www.level1.com1 RS-485 interface Page 1 of 4 Button/Knob: Reset Button IR Cut Filter: Support IR LED: Up to 30m Shutter Time: 1 s to 1/100,000 s Angle of View: Horizontal field of view: 103°to 38° Vertical field of view: 54°to 21° Diagonal field of view: 124°to 44° Video Format: H.265/H.264/MJPEG Resolution: 50Hz: 50fps (1920 × 1080, 1280 × 960, 1280×720) 60Hz: 60fps (1920 × 1080, 1280 × 960, 1280×720) Output Video Format: MPEG-4 Audio Compression: G.711/G.722.1/G.726/MP2L2, 64 Kbps (G.711)/16 Kbps (G.722.1)/16 Kbps (G.726)/32 to 128 Kbps (MP2L2 Power Input: 12V DC±10%, PoE (802.3af) Power Consumption: With extra load: 12 VDC, 0.8 A, max.
    [Show full text]
  • Gemini Broadband Ku/Ka/C Satellite Router
    Corporate Waves Primary colors Secondary colors -C Gemini Broadband Ku/Ka/C Satellite Router Enabling High Speed Broadband Services SkyEdge II-c Gemini is a compact high-throughput VSAT, designed to enable high speed broadband services while meeting cost efficiencies required by residential customers and small businesses. Gemini enables fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Gemini is a full-featured IP router, eliminating the need for an external router via support of enhanced IP routing features such as DHCP, NAT/PAT and IGMP. Advanced application-based QoS guarantees the performance of real-time applications such as VoIP and video streaming, while also supporting other data applications. Gemini also supports next generation IPv6 networking. Gemini includes a full set of protocol optimization and application acceleration features. TCP and HTTP protocol acceleration and payload compression ensure fast Web browsing and high user Benefits experience. Gemini provides the highest level of transmission security supporting • Fast web browsing with web acceleration AES-256 bit link layer encryption with dynamic key rotation to protect and compression all user traffic, and standard IP-Sec providing end to end network layer • High quality VoIP and video security. • Simple DIY installation and automatic service activation Simple, Do-It-Yourself Installation and Service Activation • DVB-S2 ACM and DVB-RCS adaptive transmission standards Gemini is designed to support quick and reliable installation, and automatic service activation. The process requires no prior VSAT • Central monitoring and service management installation skills or technical support. • C/Ku/Ka bands The outdoor electronics and antenna are designed to simplify the assembly and mounting, and shorten the antenna pointing procedure.
    [Show full text]
  • 1 the Internet Internet Levels of Access to the Internet
    The Internet DS 4250 - Business Data Communications Slide 1 Internet z Collection of interconnected networks with a common protocols. 4TCP/IP z The networks are linked through various high-speed backbones. z Routing method is hierarchical. z Can follow the packet movement on Gemini 4$ mu trace www.dell.com DS 4250 - Internet Slide 2 Levels of Access to The Internet NAP National Backbone Regional Network Internet Service Provider Consumer and Business Market ¾http://www.ispworld.com/isp/bb/n_america.htm DS 4250 - Internet Slide 3 1 Internet Structure Local ISP Local ISP Regional ISP National ISP Regional ISP National ISP NAP National ISP NationalNational ISP ISP Regional ISP National ISP NationalNational ISP ISP NAP NationalNational ISP ISP NationalNational ISP ISP Regional ISP Regional ISP Local ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP MAE Local ISP Regional ISP Regional ISP Local ISP Regional ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Figure 9-1 Basic Internet Architecture DS 4250 - Internet Slide 4 Concerns in Choosing an ISP z Examine the backbone of the provider 4Does the backbone include needed areas 4Check the speed of the network 4Examine the redundancy of the network 4What power back-ups do they have 4Connections to other providers • At least three network access points 4What is the guarantee of performance DS 4250 - Internet Slide 5 Internet Addressing z Based on the software address for each device 4A unique number for each device z Used to designate
    [Show full text]
  • Gemini Quick Start Guide 70090630
    Gemini Intercom Quick Start Guide 2 Gemini Quick Start Guide Contents Contents ......................................................................................... 1 Overview ......................................................................................... 3 First Step – unpack and inspect ...................................................... 3 Network plan and IP addresses ...................................................... 4 Management PC ............................................................................. 5 Install Software ............................................................................... 6 Configure the firewall ..................................................................... 7 Gateway – the Configuration Editor ............................................... 8 Gateway – Networked DSP ............................................................ 9 File Management ............................................................................ 9 Gemini – Setting the basics .......................................................... 10 Gemini – setting the identity (EDH address) ................................ 12 Restart to apply changes .............................................................. 12 Connect to your network ............................................................. 13 Active Clients Form ....................................................................... 13 Repeat for each Gemini in your system ....................................... 14 Gemini Web Browser ..................................................................
    [Show full text]
  • Early Use of the Gemini Observatory Archive
    1 Director’s Message 45 On the Horizon Markus Kissler-Patig Gemini staff contributions 3 Gemini South Explores the 55 A Transition Comes to an End Growth of Massive Galaxy Clusters Inger Jørgensen Sarah Sweet, Rodrigo Carrasco, and 59 Gemini Harnesses the Sun from Fernanda Urrutia Both Hemispheres 7 A Gemini Spectrum of a World Alexis Ann Acohido Colder than a Night on Maunakea Gemini Connections Andy Skemer 61 Peter Michaud 11 A Case of Warped Space: Confirming Strong Gravitational 64 A New Look for Gemini’s Legacy Lenses Found in the Dark Energy Images Survey 66 Observatory Careers: New Brian Nord and Elizabeth Buckley-Geer Resources for Students, Teachers, and Parents 16 Dusting the Universe with Supernovae 68 Journey Through the Universe: Jennifer Andrews Twelve Years, and Counting! Alexis Ann Acohido 20 Science Highlights Gemini staff contributions 71 Viaje al Universo 2016: Empowering Students with Science News for Users 31 Maunel Paredes Gemini staff contributions ON THE COVER: GeminiFocus Color composite image January 2017 / 2016 Year in Review of the galaxy cluster GeminiFocus is a quarterly publication SPT-CL J0546-5345, of the Gemini Observatory comprised of Gemini 670 N. A‘ohoku Place, Hilo, Hawai‘i 96720, USA GeMS/GSAOI and HST Phone: (808) 974-2500 Fax: (808) 974-2589 data. White inset at right bottom shows Online viewing address: www.gemini.edu/geminifocus Gemini Ks image of the region. The article on Managing Editor: Peter Michaud this work begins on Associate Editor: Stephen James O’Meara page 3. Also shown Designer: Eve Furchgott/Blue Heron Multimedia are the covers from Any opinions, findings, and conclusions or April, July, and October recommendations expressed in this material are those of issues of GeminiFocus.
    [Show full text]
  • Cellular Communications Commercial Security Fire Alarms & Devices
    CELLULAR COMMUNICATIONS COMMERCIAL SECURITY FIRE ALARMS & DEVICES CONNECTED HOME & BUSINESS TECH, VIDEO & ACCESS ADD-ONS Table of Contents At Napco, we appreciate the continued loyalty of our security professional customers and hearing from you – what you like about our products &/or what you’d like to see next. Included here is some of that feedback along with some fast market facts. Thanks for the support. COMMERCIAL FIRE SYSTEMS Firewolf Fire Alarm Systems, Devices, Configurations & Diagram...................................................1 & 2 FireLink FACP with Cellular Built-in ..............................................................................................................3 COMMERCIAL INTEGRATED SECURITY SYSTEMS Napco Commercial GEMC-Series Integrated Security/Fire/Access Control Platform, Configurations & Diagram .....................................................................................................................4 & 5 Napco Commercial Systems and Firewolf & FireLink Fire Alarms Ordering Info. ...............................6 CELLULAR COMMUNICATION SOLUTIONS StarLink Fire Sole & Dual Path Cell/IP Communicators & Ordering Info. ........................................7 & 8 StarLink Line Model Comparison & Ordering, Commercial Fire, Intrusion & Connected Home/Business Applications ........................................................................................................................9 StarLink Intrusion Cellular Communicators & Ordering Info. ...............................................................
    [Show full text]
  • Skyedge Ii-C Gemini-I
    SKYEDGE II-C GEMINI-I Consumer Broadband Internet VSAT ENABLING HIGH-SPEED BROADBAND SERVICES BENEFITS SkyEdge II-c Gemini-i is a high-throughput VSAT, designed to Fast web browsing with web acceleration and compression enable high-speed consumer broadband Internet services while meeting cost efficiencies required by residential customers. Enables high-quality VoIP and video Gemini-i facilitates fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Simple installation and service activation By acting as a home router, Gemini-i also supports multiple devices through its integrated DHCP server, NAT/PAT and IGMP. Advanced QoS guarantees the performance of real- Forward and return adaptive transmission technologies time applications such as VoIP and video streaming while simultaneously enabling additional data applications. Gemini-i also Central monitoring and service management supports next-generation IPv6 networking. To ensure fast web browsing and a high-quality user experience, Supports C, Ku and Ka bands Gemini-i contains a full set of protocol optimization and application acceleration features, including TCP and HTTP protocol acceleration and payload compression. Gemini-i provides the highest level of transmission security, supporting X.509 terminal authentication and AES-256 bit link layer encryption with dynamic key rotation to protect all user traffic. SIMPLE, DO-IT-YOURSELF INSTALLATION AND SERVICE ACTIVATION Gemini-i is designed to enable quick and reliable installation and automatic service activation. The process requires no prior VSAT installation skills or technical support. The outdoor electronics and antenna are designed to simplify the assembly and mounting while shortening the antenna-pointing procedure. The outdoor unit includes an audio device to guide and provide feedback during the antenna-pointing process.
    [Show full text]
  • Gemini and NTS Exit Reform API Usage Guidelines
    Gemini and NTS Exit Reform API Usage Guidelines ~ 1 ~ Table of Contents 1. Introduction ............................................................................................................................................6 1.1. API Technology Overview ....................................................................................................................6 2. API Client Development Guidelines .....................................................................................................8 2.1. HTTPS and SSL ...................................................................................................................................9 2.2. Authentication and Authorization ...................................................................................................... 10 2.3. Maintaining the Session .................................................................................................................... 10 2.4. Authentication / Loss of Session / Authorization Failures ................................................................. 10 2.5. Request a Compressed Response to your API Client ...................................................................... 11 3. API Configuration Details ................................................................................................................... 14 3.1. API Technology Overview ................................................................................................................. 14 3.2. Network Requirements .....................................................................................................................
    [Show full text]
  • Gemini 720Im
    Gemini 720im Gemini 720im Product Manual Document: 0729-SOM-00002, Issue: 4 Document: 0729-SOM-00002, Issue: 4 1 © Tritech International Ltd. Gemini 720im © Tritech International Ltd The copyright in this document is the property of Tritech International Ltd. The document is supplied by Tritech International Ltd on the understanding that it may not be copied, used, or disclosed to others except as authorised in writing by Tritech International Ltd. Tritech International Ltd reserves the right to change, modify and update designs and specifications as part of their ongoing product development programme. All product names are trademarks of their respective companies. Open Source License Statement: This product includes software code developed by third parties, including software code subject to the GNU General Public License Version 2 ("GPLv2"). We will provide upon request the applicable GPL source code files via CD-ROM or similar storage medium for a nominal cost to cover shipping and media charges as allowed under the GPL. This offer is valid for a 3 year period from first manufacture of this product. General Public License ("GPLv2") Inquiries: Please direct all GPL inquiries to the following address: Tritech International Ltd Peregrine Road Westhill Business Park Westhill, Aberdeenshire AB32 6JL, UK Document: 0729-SOM-00002, Issue: 4 2 © Tritech International Ltd. Gemini 720im Table of Contents Warning Symbols ........................................................................................................ 4 1. Introduction ............................................................................................................
    [Show full text]
  • GEMINI Fixed IP Network Camera, 6-Megapixel, H.265, 4.3X Optical Zoom, IR Leds, Indoor/Outdoor
    FCS-5212 Version: 1 GEMINI Fixed IP Network Camera, 6-Megapixel, H.265, 4.3X Optical Zoom, IR LEDs, Indoor/Outdoor The LevelOne FCS-5212 is a fixed-position outdoor camera offering an ultra-reliable, cost-effective solution for outdoor IP surveillance networks, and is rated at IP67 to operate within rain, extreme heat, snow, dust and humid conditions. Offering clear, sharp imagery with 6-Megapixel resolution and the versatility of 802.3af standard PoE to transfer power and data via a single Cat.5 cable, the LevelOne FCS-5212 should be an essential part of any security deployment that requires smart, reliable outdoor cameras. Key Features - 6-Megapixel high-definition resolution - Video compression: H.264, H.265, MJPEG - Supports 3 video streams simultaneously - Supports 4.3X optical zoom - Features WDR (Wide Dynamic Range) to enhance visibility under extremely bright or dark environments - Weatherproof IP67-rated housing - Vandal-proof IK10-rated housing - Built-in infrared LEDs for night viewing up to 50m - Supports iPhone/Android phone remote viewing over the Internet Specifications System Specifications Standards: TCP(IPv6/v4), UDP, HTTP, HTTPS, DHCP, PPPoE, RTP, RTSP, DNS, DDNS, NTP, ICMP, ARP, IGMP, SMTP,FTP,SAMBA UPnP, SNMP, Bonjour IEEE 802.3 10-BASE-T, Ethernet IEEE 802.3u 100-BASE-TX, Fast Ethernet IEEE 802.3af Power over Ethernet (PoE) IEEE 802.1X Network Access Control Image Sensor: 1/2.9" Progressive Scan CMOS Lens: Aut Focus @F1.6, 2.8~12mm Motorized VF LENS www.level1.com Page 1 of 4 Port: 1 x RJ-45 10/100 Mbps PoE port
    [Show full text]
  • Gemini Guide to Connectivity Xoserve Gemini Production Access Through Citrix & API
    Gemini Guide To Connectivity Xoserve Gemini Production Access Through Citrix & API CONTENTS Table of Contents 1. Introduction .................................................................................................................................................. 4 1.1 Purpose and Scope .................................................................................................................................................4 1.2 Intended Audience...................................................................................................................................................4 1.3 Gemini Services .......................................................................................................................................................4 2. Online (Citrix) Access Configuration Details............................................................................................5 2.1 Infrastructure ............................................................................................................................................................5 2.2 Network Requirements............................................................................................................................................5 2.3 Citrix Client for Windows.........................................................................................................................................6 2.4 Best Practices to deploy Citrix Clients ..................................................................................................................6
    [Show full text]
  • GRP- Gemini Production Access Through Citrix &
    Gemini 2020 Guide to Connectivity Page 1 of 20 Xoserve Gemini Production Access Through Citrix & API CONTENTS 1 INTRODUCTION ..................................................................................................................... 4 1.1 PURPOSE AND SCOPE ......................................................................................................................... 4 1.2 INTENDED AUDIENCE .......................................................................................................................... 4 1.3 GEMINI SERVICES ............................................................................................................................... 4 2 ONLINE (CITRIX) ACCESS CONFIGURATION DETAILS ..................................................... 5 2.1 INFRASTRUCTURE ............................................................................................................................... 5 2.2 NETWORK REQUIREMENTS .................................................................................................................. 5 2.3 CITRIX CLIENT FOR WINDOWS ............................................................................................................. 6 2.4 BEST PRACTICES TO DEPLOY CITRIX CLIENTS ...................................................................................... 6 2.5 GEMINI PRODUCTION ACCESS THROUGH CITRIX RECEIVER ................................................................... 9 2.6 GEMINI LOGON ................................................................................................................................
    [Show full text]