PhishNet: Predictive Blacklisting to Detect Phishing Attacks

被引:0
|
作者
Prakash, Pawan [1 ]
Kumar, Manish [1 ]
Kompella, Ramana Rao [1 ]
Gupta, Minaxi [2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Indiana Univ, Bloomington, IN 47405 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance on exact match with the blacklisted entries makes it easy for attackers to evade. We start with the observation that attackers often employ simple modifications (e. g., changing top level domain) to URLs. Our system, PhishNet, exploits this observation using two components. In the first component, we propose five heuristics to enumerate simple combinations of known phishing sites to discover new phishing URLs. The second component consists of an approximate matching algorithm that dissects a URL into multiple components that are matched individually against entries in the blacklist. In our evaluation with real-time blacklist feeds, we discovered around 18,000 new phishing URLs from a set of 6,000 new blacklist entries. We also show that our approximate matching algorithm leads to very few false positives (3%) and negatives (5%).
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Phishing Attacks Modifications and Evolutions
    Cui, Qian
    Jourdan, Guy-Vincent
    Bochmann, Gregor V.
    Onut, Iosif-Viorel
    Flood, Jason
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 243 - 262
  • [22] Cognitive Triaging of Phishing Attacks
    van der Heijden, Amber
    Allodi, Luca
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1309 - 1326
  • [23] Analysis of phishing attacks and countermeasures
    Issac, Biju
    Chiong, Raymond
    Jacob, Seibu Mary
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
  • [24] Phishing Attacks Root Causes
    Abroshan, Hossein
    Devos, Jan
    Poels, Geert
    Laermans, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 187 - 202
  • [25] Phishing Site Detection and Blacklisting Using EVCS, Steganography Based on Android Application
    Shaji, Ashitha
    Stephen, Mariya
    Sadanandan, Seethal
    Sreelakshmi, S.
    Fasila, K. A.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1384 - 1390
  • [26] Mitigating Phishing Attacks: An Overview
    Sumner, Alex
    Yuan, Xiaohong
    PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 72 - 77
  • [27] PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
    Castano, Felipe
    Fernandez, Eduardo Fidalgo
    Alaiz-Rodriguez, Rocio
    Alegre, Enrique
    IEEE ACCESS, 2023, 11 : 40779 - 40789
  • [28] BGL-PhishNet: Phishing Website Detection Using Hybrid Model-BERT, GNN, and LightGBM
    Remya, S.
    Pillai, Manu J.
    Aparna, B. S.
    Subbareddy, Somula Rama
    Cho, Yong Yun
    IEEE ACCESS, 2025, 13 : 47552 - 47569
  • [29] Recognition of genuine and phishing emails may not be associated with response to phishing attacks
    Crgol, Alex
    Vrhovec, Simon
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1265 - 1283
  • [30] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561