The Phish Market Protocol: Securely Sharing Attack Data Between Competitors Poster Proposal
نویسندگان
چکیده
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to specialist companies. Prior work has shown that these take-down companies refuse to share their ‘feeds’ of phishing website URLs with each other, and consequently, many phishing websites are not removed because the company with the take-down contract remains unaware of their existence. The take-down companies are reticent to exchange their feeds with each other, fearing that competitors with less comprehensive feeds might ‘freeride’ off their efforts and stop investing resources to find new websites, as well as use the feeds to poach clients. To help solve this problem, we propose the Phish Market protocol, which enables companies with less comprehensive feeds to learn about websites impersonating their own clients that are held by other firms. The protocol is designed so that the contributing firm is compensated only for those websites affecting its competitor’s clients and only those previously unknown to the receiving firm. Crucially, the protocol does not reveal to the contributing source which URLs are needed by the receiver, as this is viewed as sensitive information by take-down firms. Using the complete lists of phishing URLs obtained from two large take-down companies, our elliptic-curve-based implementation added a negligible average 5 second delay to securely share URLs.
منابع مشابه
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to specialist firms. Prior work has shown that these take-down companies refuse to share ‘feeds’ of phishing website URLs with each other, and consequently, many phishing websites are not removed because the firm with the take-down c...
متن کاملAn Efficient Sealed-bid Auction Protocol with Bid Privacy and Bidder Privacy
In this paper, a sealed-bid auction protocol which mainly focuses on security issues: bid privacy, bidder anonymity and fairness problem is presented. The new proposal is motivated by the conflict between bidder anonymity and DOS (denial-of-service) attack from insider. It utilizes an efficient LPN-based authentication method to accomplish lightweight authentication. In order to share the deter...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملPredictive protocol for the scalable identification of RFID tags through collaborative readers
Radio frequency identification (RFID) is a technology aimed at efficiently identifying products that has greatly influenced the manufacturing businesses in recent years. Although the RFID technology has been widely accepted by the manufacturing and retailing sectors, there are still many issues regarding its scalability, security and privacy. With regard to privacy, the sharing of identificatio...
متن کاملDistributed Outsourcing of Computation on Private Data∗ A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures used by current implementations of the Certified Information Access primitive. To this aim, we introduce the concept of a Verifiable Deterministic Envelope that may be of independent interest and of which we provide pra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009