Tracking Phishing Attacks Over Time

被引:54
|
作者
Cui, Qian [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor, V [1 ]
Couturier, Russell [2 ]
Onut, Iosif-Viorel [3 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] IBM Secur, CTO Forens, Atlanta, GA USA
[3] IBM Ctr Adv Studies, Principal R&D Strategist, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing Detection; Clustering;
D O I
10.1145/3038912.3052654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. This provides several opportunities and insights for the fight against phishing: first, quickly and efficiently detecting replicas is a very effective prevention tool. We detail one such tool in this paper. Second, the widely held belief that phishing attacks are dealt with promptly is but an illusion. We have recorded numerous attacks that stay active throughout our observation period. This shows that the current prevention techniques are ineffective and need to be overhauled. We provide some suggestions in this direction. Third, our observation give a new perspective into the modus operandi of attackers. In particular, some of our observations suggest that a small group of attackers could be behind a large part of the current attacks. Taking down that group could potentially have a large impact on the phishing attacks observed today.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 50 条
  • [41] Two-level authentication approach to protect from phishing attacks in real time
    Ankit Kumar Jain
    B. B. Gupta
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1783 - 1796
  • [42] PhishNet: Predictive Blacklisting to Detect Phishing Attacks
    Prakash, Pawan
    Kumar, Manish
    Kompella, Ramana Rao
    Gupta, Minaxi
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [43] A Computer Vision Technique to Detect Phishing Attacks
    Rao, Routhu Srinivasa
    Ali, Syed Taqi
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 596 - 601
  • [44] BogusBiter: A Transparent Protection Against Phishing Attacks
    Yue, Chuan
    Wang, Haining
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2010, 10 (02)
  • [45] How to prepare for the onslaught of phishing email attacks
    Burke, Stephen
    Computer Fraud and Security, 2021, 2021 (05): : 12 - 14
  • [46] Phishing Attacks and Preventions in Blockchain Based Projects
    Andryukhin, A. A.
    2019 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND COMPUTER SCIENCE (ENT): INNOVATION & APPLICATION, 2019, : 15 - 19
  • [47] Tracking a Person Over Time Is Tracking What?
    Brook, Andrew
    TOPICS IN COGNITIVE SCIENCE, 2014, 6 (04) : 585 - 598
  • [48] A game design framework for avoiding phishing attacks
    Arachchilage, Nalin Asanka Gamagedara
    Love, Steve
    COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (03) : 706 - 714
  • [49] Taking the bait: a systems analysis of phishing attacks
    Lacey, David
    Salmon, Paul
    Glancy, Patrick
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 1109 - 1116
  • [50] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101