Machine Learning-Enabled Attacks on Anti-Phishing Blacklists

被引:0
|
作者
Li, Wenhao [1 ]
Laghari, Shams Ul Arfeen [2 ]
Manickam, Selvakumar [1 ]
Chong, Yung-Wey [3 ]
Li, Binyong [4 ]
机构
[1] Univ Sains Malaysia, Cybersecur Res Ctr, Gelugor 11800, Penang, Malaysia
[2] Bahrain Polytech Isa Town, Fac Engn Design Informat & Commun Technol EDICT, Sch ICT, Isa Town, Bahrain
[3] Univ Sains Malaysia, Sch Comp Sci, Gelugor 11800, Penang, Malaysia
[4] Chengdu Univ Informat Technol, Sch Cybersecur, Chengdu 610225, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Blocklists; Phishing; Browsers; Security; Chatbots; Accuracy; Internet; Feature extraction; Deep learning; Uniform resource locators; Anti-phishing blacklist; cloaking technique; evasion technique; machine learning; phishing website; phishing; social engineering;
D O I
10.1109/ACCESS.2024.3516754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of phishing attacks has become a critical threat to online security, exploiting both system vulnerabilities and human psychology. Although anti-phishing blacklists serve as a primary defense mechanism, they are limited by incomplete coverage and delayed updates, making them susceptible to evasion by sophisticated attackers. This study presents a comprehensive security analysis of anti-phishing blacklists and introduces two novel cloaking attacks-Feature-Driven Cloaking and Transport Layer Security (TLS)-Based Cloaking-that exploit vulnerabilities in the automated detection systems of anti-phishing entities (APEs). Using real-world data and employing machine learning techniques, the Random Forest (RF) classifier emerged as the most effective among all tested supervised classifiers, achieving 100% accuracy in distinguishing APEs from regular users and enabling attackers to bypass blacklist detection. Key findings highlight critical security flaws in major APEs, including limited infrastructure diversity, feature implementation inconsistencies, and vulnerabilities to Web Real-Time Communication (WebRTC) Internet Protocol (IP) leaks. These weaknesses extend the operational lifespan of phishing websites, heightening risks to users. The results emphasize the need for APEs to implement more robust and adaptive defenses and propose mitigation strategies to enhance the resilience of the anti-phishing ecosystem.
引用
收藏
页码:191586 / 191602
页数:17
相关论文
共 50 条
  • [41] AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 595 - 607
  • [42] Commentary: Towards machine learning-enabled epidemiology
    Jorm, Louisa R.
    INTERNATIONAL JOURNAL OF EPIDEMIOLOGY, 2020, 49 (06) : 1770 - 1773
  • [43] AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 365 - 380
  • [44] Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022
    Gao, Yang
    Ampel, Benjamin M.
    Samtani, Sagar
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (01):
  • [45] An Evaluation of Users' Anti-Phishing Knowledge Retention
    Alnajim, Abdullah
    Munro, Malcolm
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
  • [46] A new approach creating an anti-phishing seal
    Luca, Daniel L.
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
  • [47] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [48] A Novel Anti-phishing Effectiveness Evaluator Model
    Sankhwar, Shweta
    Pandey, Dhirendra
    Khan, R. A.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
  • [49] SEFAP: An email system fox anti-phishing
    Ren, Qiong
    Mu, Yi
    Susilo, Willy
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
  • [50] POSTER: Proactive Blacklist Update for Anti-Phishing
    Lee, Lung-Hao
    Lee, Kuei-Ching
    Chen, Hsin-Hsi
    Tseng, Yuen-Hsien
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450