Tracking Phishing Attacks Over Time

被引:54
|
作者
Cui, Qian [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor, V [1 ]
Couturier, Russell [2 ]
Onut, Iosif-Viorel [3 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] IBM Secur, CTO Forens, Atlanta, GA USA
[3] IBM Ctr Adv Studies, Principal R&D Strategist, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing Detection; Clustering;
D O I
10.1145/3038912.3052654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. This provides several opportunities and insights for the fight against phishing: first, quickly and efficiently detecting replicas is a very effective prevention tool. We detail one such tool in this paper. Second, the widely held belief that phishing attacks are dealt with promptly is but an illusion. We have recorded numerous attacks that stay active throughout our observation period. This shows that the current prevention techniques are ineffective and need to be overhauled. We provide some suggestions in this direction. Third, our observation give a new perspective into the modus operandi of attackers. In particular, some of our observations suggest that a small group of attackers could be behind a large part of the current attacks. Taking down that group could potentially have a large impact on the phishing attacks observed today.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 50 条
  • [31] BOOST YOUR RESISTANCE TO PHISHING ATTACKS
    不详
    HARVARD BUSINESS REVIEW, 2020, 98 (05) : 17 - 20
  • [32] A Framework for Detection and Measurement of Phishing Attacks
    Garera, Sujata
    Provos, Niels
    Chew, Monica
    Rubin, Aviel D.
    WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, 2007, : 1 - 8
  • [33] Alerting Users About Phishing Attacks
    Desolda, Giuseppe
    Di Nocera, Francesco
    Ferro, Lauren
    Lanzilotti, Rosa
    Maggi, Piero
    Marrella, Andrea
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 134 - 148
  • [34] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    Computer Journal, 2006, 49 (05): : 554 - 561
  • [35] Preventive Techniques of Phishing Attacks in Networks
    Adil, Muhammad
    Khan, Rahim
    Ul Ghani, M. Ahmad Nawaz
    2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
  • [36] The Highly Insidious Extreme Phishing Attacks
    Zhao, Rui
    John, Samantha
    Karas, Stacy
    Bussell, Cara
    Roberts, Jennifer
    Six, Daniel
    Gavett, Brandon
    Yue, Chuan
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [37] An overview of phishing attacks and their detection techniques
    Dadkhah M.
    Jazi M.D.
    Mobarakeh M.S.
    Shamshirband S.
    Wang X.
    Raste S.
    Dadkhah, Mehdi (dadkhah80@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 187 - 195
  • [38] Protection mechanisms against phishing attacks
    Plössl, K
    Federrath, H
    Nowey, T
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 20 - 29
  • [39] Real-Time, Evidence-Based Alerts for Protection From Phishing Attacks
    Baki, Shahryar
    Qachfar, Fatima Zahra
    Verma, Rakesh M.
    Kennedy, Ryan
    Jones, Daniel N.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1055 - 1069
  • [40] Two-level authentication approach to protect from phishing attacks in real time
    Jain, Ankit Kumar
    Gupta, B. B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (06) : 1783 - 1796