PhishNet: Predictive Blacklisting to Detect Phishing Attacks

被引:0
|
作者
Prakash, Pawan [1 ]
Kumar, Manish [1 ]
Kompella, Ramana Rao [1 ]
Gupta, Minaxi [2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Indiana Univ, Bloomington, IN 47405 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance on exact match with the blacklisted entries makes it easy for attackers to evade. We start with the observation that attackers often employ simple modifications (e. g., changing top level domain) to URLs. Our system, PhishNet, exploits this observation using two components. In the first component, we propose five heuristics to enumerate simple combinations of known phishing sites to discover new phishing URLs. The second component consists of an approximate matching algorithm that dissects a URL into multiple components that are matched individually against entries in the blacklist. In our evaluation with real-time blacklist feeds, we discovered around 18,000 new phishing URLs from a set of 6,000 new blacklist entries. We also show that our approximate matching algorithm leads to very few false positives (3%) and negatives (5%).
引用
收藏
页数:5
相关论文
共 50 条
  • [11] PhishTransformer: A Novel Approach to Detect Phishing Attacks Using URL Collection and Transformer
    Asiri, Sultan
    Xiao, Yang
    Li, Tieshan
    ELECTRONICS, 2024, 13 (01)
  • [12] NDLP Phishing: A Fine-Tuned Application to Detect Phishing Attacks Based on Natural Language Processing and Deep Learning
    Benavides-Astudillo E.
    Fuertes W.
    Sanchez-Gordon S.
    Nuñez-Agurto D.
    International Journal of Interactive Mobile Technologies, 2024, 18 (10): : 173 - 190
  • [13] Detection of phishing attacks
    Baykara, Muhammet
    Gurel, Zahit Ziya
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 399 - 403
  • [14] The State of Phishing Attacks
    Hong, Jason
    COMMUNICATIONS OF THE ACM, 2012, 55 (01) : 74 - 81
  • [15] Phishing Attacks and Defenses
    Chaudhry, Junaid Ahsenali
    Chaudhry, Shafique Ahmad
    Rittenhouse, Robert G.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 247 - 256
  • [16] Enhanced Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
    Jafar, Mousa Tayseer
    Al-Fawa'reh, Mohammad
    Barhoush, Malek
    Alshira'H, Mohammad H.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (01) : 60 - 76
  • [17] Development of BiLSTM deep learning model to detect URL-based phishing attacks
    Akcam, Oznur Sifa
    Tekerek, Adem
    Tekerek, Mehmet
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [18] Predictive Blacklisting as an Implicit Recommendation System
    Soldo, Fabio
    Le, Anh
    Markopoulou, Athina
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [19] Phishing Attacks on Modern Android
    Aonzo, Simone
    Merlo, Alessio
    Tavella, Giulio
    Fratantonio, Yanick
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1788 - 1801
  • [20] Solution prevents phishing attacks
    不详
    R&D MAGAZINE, 2004, 46 (10): : 17 - 17