Tracking Phishing Attacks Over Time

被引:54
|
作者
Cui, Qian [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor, V [1 ]
Couturier, Russell [2 ]
Onut, Iosif-Viorel [3 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] IBM Secur, CTO Forens, Atlanta, GA USA
[3] IBM Ctr Adv Studies, Principal R&D Strategist, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing Detection; Clustering;
D O I
10.1145/3038912.3052654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. This provides several opportunities and insights for the fight against phishing: first, quickly and efficiently detecting replicas is a very effective prevention tool. We detail one such tool in this paper. Second, the widely held belief that phishing attacks are dealt with promptly is but an illusion. We have recorded numerous attacks that stay active throughout our observation period. This shows that the current prevention techniques are ineffective and need to be overhauled. We provide some suggestions in this direction. Third, our observation give a new perspective into the modus operandi of attackers. In particular, some of our observations suggest that a small group of attackers could be behind a large part of the current attacks. Taking down that group could potentially have a large impact on the phishing attacks observed today.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 50 条
  • [1] Phishing Attacks Over Time: A Longitudinal Study
    Yates, Dave
    Harris, Albert L.
    AMCIS 2015 PROCEEDINGS, 2015,
  • [2] Phishing attacks over time: A longitudinal study
    20161602257575
    (1) University of Denver, United States; (2) Appalachian State University, United States, 1600, (Americas Conference on Information Systems):
  • [3] Detection of phishing attacks
    Baykara, Muhammet
    Gurel, Zahit Ziya
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 399 - 403
  • [4] The State of Phishing Attacks
    Hong, Jason
    COMMUNICATIONS OF THE ACM, 2012, 55 (01) : 74 - 81
  • [5] Phishing Attacks and Defenses
    Chaudhry, Junaid Ahsenali
    Chaudhry, Shafique Ahmad
    Rittenhouse, Robert G.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 247 - 256
  • [6] Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks
    Mahmood, Syed Hasan Amin
    Abbasi, Syed Mustafa Ali
    Abbasi, Ahmed
    Zaffar, Fareed
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 224 - 229
  • [7] Phishing Attacks on Modern Android
    Aonzo, Simone
    Merlo, Alessio
    Tavella, Giulio
    Fratantonio, Yanick
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1788 - 1801
  • [8] Solution prevents phishing attacks
    不详
    R&D MAGAZINE, 2004, 46 (10): : 17 - 17
  • [9] Phishing Attacks Modifications and Evolutions
    Cui, Qian
    Jourdan, Guy-Vincent
    Bochmann, Gregor V.
    Onut, Iosif-Viorel
    Flood, Jason
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 243 - 262
  • [10] Cognitive Triaging of Phishing Attacks
    van der Heijden, Amber
    Allodi, Luca
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1309 - 1326