Tracking Phishing Attacks Over Time

被引:54
|
作者
Cui, Qian [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor, V [1 ]
Couturier, Russell [2 ]
Onut, Iosif-Viorel [3 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] IBM Secur, CTO Forens, Atlanta, GA USA
[3] IBM Ctr Adv Studies, Principal R&D Strategist, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing Detection; Clustering;
D O I
10.1145/3038912.3052654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. This provides several opportunities and insights for the fight against phishing: first, quickly and efficiently detecting replicas is a very effective prevention tool. We detail one such tool in this paper. Second, the widely held belief that phishing attacks are dealt with promptly is but an illusion. We have recorded numerous attacks that stay active throughout our observation period. This shows that the current prevention techniques are ineffective and need to be overhauled. We provide some suggestions in this direction. Third, our observation give a new perspective into the modus operandi of attackers. In particular, some of our observations suggest that a small group of attackers could be behind a large part of the current attacks. Taking down that group could potentially have a large impact on the phishing attacks observed today.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 50 条
  • [21] Analysis of phishing attacks against students
    Andric, Jakov
    Oreski, Dijana
    Kisasondi, Tonimir
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1423 - 1429
  • [22] Evaluating user susceptibility to phishing attacks
    Das, Sanchari
    Nippert-Eng, Christena
    Camp, L. Jean
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (01) : 1 - 18
  • [23] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [24] Why phishing still works: User strategies for combating phishing attacks
    Alsharnouby, Mohamed
    Alaca, Furkan
    Chiasson, Sonia
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 : 69 - 82
  • [25] South Africans' susceptibility to phishing attacks
    Wannenburg, Mariska C.
    Nieman, Annamart
    Steyn, Blanche
    Wannenburg, Daniel G.
    SOUTHERN AFRICAN JOURNAL OF ACCOUNTABILITY AND AUDITING RESEARCH-SAJAAR, 2023, 25 : 53 - 72
  • [26] Phishing Attacks and Protection Against Them
    Ivanov, Michael A.
    Kliuchnikova, Bogdana, V
    Chugunkov, Ilya, V
    Plaksina, Anna M.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 425 - 428
  • [27] Tools for Investigating the Phishing Attacks Dynamics
    Lyashenko, Vyacheslav
    Kobylin, Oleg
    Minenko, Mykyta
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 43 - 46
  • [28] Generating Phishing Attacks using ChatGPT
    Roy, Sayak Saha
    Naragam, Krishna Vamsi
    Nilizadeh, Shirin
    arXiv, 2023,
  • [29] Online detection and prevention of phishing attacks
    Institute of Communications Engineering, PLA Univ. of Sci. and Tech., Nanjing 210007, China
    Jiefangjun Ligong Daxue Xuebao, 2007, 2 (133-138): : 133 - 138
  • [30] Examining the effectiveness of phishing filters against DNS based phishing attacks
    Purkait, Swapan
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (03) : 333 - 346