Poster: Lightweight Content-based Phishing Detection
نویسندگان
چکیده
I. INTRODUCTION Increasing use of Internet banking and shopping by a broad spectrum of users results in greater potential profits from phishing attacks. Phish are fake websites that masquerade as legitimate sites, to trick unsuspecting users into sharing sensitive information: credentials, passwords, financial information, or other personal information that can enable fraud. This threat is especially dire for financial services and sites involving on-line payment: an attacker can use stolen credentials to steal money or make fraudulent transactions. Most browsers today detect potential phishing with URL blacklists such as the Google Safe Browsing API, Phish-Tank [1], Is It Phishing [2] service, and the Netcraft toolbar [3]. The browser checks each website a web user visits against a list of known bad sites that is typically cached locally and refreshed regularly. While effective at stopping previously known threats, blacklists must react to new threats as they are discovered, leaving an inevitable period of vulnerability where users are vulnerable. Attackers exploit this gap by changing URLs for phishing sites frequently. Alternatively, whitelists can identify predetermined web-sites as " known-good ". Whitelists thus avoid the race to identify and add new phishing sites, but have their own delays in approving new sites, and by definition prohibits (or strongly discourages) use of sites off the list. This delay makes them too limited for many users. Our goal is proactive detection of phishing websites with neither the delay of blacklist identification nor the strict constraints of whitelists. Our approach is to list known phishing targets, index the content at their correct sites, then look for this content to appear at incorrect sites to signal a phishing site. While prior work has visually compared good website layouts with potential phishing sites [4], we focus on the content itself. Our insight is that cryptographic hashing of page contents allows efficient bulk identification of content reuse at phishing sites. Our contribution is to build a system to detect phish by comparing hashes of visited websites to the hashes of the original, known good, legitimate website. We implement our approach in the form of a browser extension in Google Chrome, and show that our algorithms detect a majority of phish, even with minimal countermeasures to page obfuscation. A small number of alpha users have been using the browser extension without issues, and we have released our extension and source code at
منابع مشابه
Poster: Syntactic Element Similarity for Phishing Detection
This poster present the result of the comparison of the subject and object of verbs in their usage between phishing emails and legitimate emails. This research aims to investigate whether subjects and objects of verbs can be distinguishable features for phishing detection. This poster also reports the same comparison between old and up-to-date phishing emails to explore if patterns in phishing ...
متن کاملPoster: User-Centric Phishing Threat Detection
This paper presents a context-aware phishing threat detection model from users’ behavioral perspectives. The context of users’ information accesses is investigated to explore the users’ browsing behaviors that confront phishing situations. Large-scale experiments show that our approach achieves an accuracy of 0.9973 and an F1 score of 0.9311 for predicting the phishing threats of users’ next ac...
متن کاملA Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection
Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...
متن کاملLightweight Phishing URLs Detection Using N-gram Features
Phishing is a kind of attack that belongs to social engineering and this attack seeks to trick people in order to let them reveal their confidential information. Several methods are introduced to detect phishing websites by using different types of features. Unfortunately, these techniques implemented for specific attack vector such as detecting phishing emails which make implementing wide scop...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015