Homoglyph Attack Detection with Unpaired Data

被引:0
|
作者
Lu, Yiwei [1 ]
Kumar, Mahesh K. [1 ]
Mohammed, Noman [1 ]
Wang, Yang [1 ]
机构
[1] Univ Manitoba, Winnipeg, MB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Homoglyph Attack; Neural Network; Cyber Security;
D O I
10.1145/3318216.3363337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The human eyes fall prey to cyber-attacks designed to visually deceive us. One such attack that has been effective is named spoofing or homoglyph attack. A homoglyph attack employs a simple trick to deceive us by using a spoof domain or process (file) name that is hard to distinguish from the legitimate names. Due to this, a user might be drawn to click on the spoof process or domain names, and in worst-case it results in triggering any malicious malware planted in them. As a result, their sensitive personal information might be at risk of being exposed. To address the problem mentioned above, existing works use simple approaches related to string comparison techniques that are extensively applied to compare genomes. Although they are effective, these methods are computationally expensive and suffer from low precision due to high false positive predictions. In recent years, machine learning has been applied to a variety of problems, and similar efforts have been made to address homoglyph attacks with neural networks to improve the efficiency of preemptive cyber-attack detection. However, both of these approaches have a common constraint, which is related to the requirement of paired sequences to determine the difference between real vs. spoof strings. As a result, existing approaches are not practical to real-world scenarios when paired sequences are unavailable. In this paper, we introduce a new unpaired homoglyph attack detection system using a convolutional neural network. We formulate two unpaired datasets based on the original datasets reported in [36], which contain real and spoof names for both domains and processes. We train the model end-to-end in a supervised manner. Our experiments demonstrate the robustness of our model in terms of performance in detecting homoglyph attacks. Additionally, it is easy to integrate into any browser with a simple REST [28] API. We show that our model can reach state-of-the-art in detecting homoglyph attack with 94% accuracy on the domain spoof dataset and 95% accuracy on process spoof dataset even without requiring paired data as input. We believe that this work is useful in realworld to appropriately safeguard sensitive information of the users from adversaries.
引用
收藏
页码:377 / 382
页数:6
相关论文
共 50 条
  • [1] Homoglyph Attack Detection Model Using Machine Learning and Hash Function
    Almuhaideb, Abdullah M.
    Aslam, Nida
    Alabdullatif, Almaha
    Altamimi, Sarah
    Alothman, Shooq
    Alhussain, Amnah
    Aldosari, Waad
    Alsunaidi, Shikah J.
    Alissa, Khalid A.
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [2] Rapid Homoglyph Prediction and Detection
    Ginsberg, Avi
    Yu, Cui
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 17 - 23
  • [3] Siamese neural network architecture for homoglyph attacks detection
    Vinayakumar, R.
    Soman, K. P.
    [J]. ICT EXPRESS, 2020, 6 (01): : 16 - 19
  • [4] Homoglyph transformation based watermarking for XML data in relational databases
    Imamoglu, Mustafa Bilgehan
    Ulutas, Mustafa
    [J]. PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2019, 25 (05): : 586 - 595
  • [5] Big Data Testbed for Network Attack Detection
    Csubak, Daniel
    Szuecs, Katalin
    Voeroes, Peter
    Kiss, Attila
    [J]. ACTA POLYTECHNICA HUNGARICA, 2016, 13 (02) : 47 - 57
  • [6] Deep Learning Poison Data Attack Detection
    Chacon, Henry
    Silva, Samuel Henrique
    Rad, Paul
    [J]. 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 971 - 978
  • [7] Shilling attack detection in binary data: a classification approach
    Batmaz, Zeynep
    Yilmazel, Burcu
    Kaleli, Cihan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) : 2601 - 2611
  • [8] Data-Driven Attack Detection for Linear Systems
    Krishnan, Vishaal
    Pasqualetti, Fabio
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (02): : 671 - 676
  • [9] A combined data mining approach for DDoS attack detection
    Kim, M
    Na, H
    Chae, K
    Bang, H
    Na, J
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 943 - 950
  • [10] MULTOPS: A data-structure for bandwidth attack detection
    Gil, TM
    Poletto, M
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 23 - 34