An information-sharing based anti-phishing system

被引:0
|
作者
Cheng, Yueqing [1 ]
Yuan, Zhen [1 ]
Ma, Lei [1 ]
Deng, Robert H. [2 ]
机构
[1] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[2] Singapore Management Univ, Singapore, Singapore
关键词
D O I
10.1109/ISDPE.2007.65
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the design of an information sharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to more complete and up to date information and is in a much better position than individual clients to make informed decisions. Our system is designed to counter against deceptive phishing as well as DNS-hijack attack.
引用
收藏
页码:265 / +
页数:3
相关论文
共 50 条
  • [1] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [2] A Honeypots Based Anti-Phishing Framework
    Chauhan, Shubhika
    Shiwani, Savita
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 618 - 625
  • [3] SEFAP: An email system fox anti-phishing
    Ren, Qiong
    Mu, Yi
    Susilo, Willy
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
  • [4] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    [J]. FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [5] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [6] An Anti-Phishing Method based on Feature Analysis
    Rajab, Majed
    [J]. 2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, : 133 - 139
  • [7] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    [J]. SN Computer Science, 2020, 1 (1)
  • [8] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [9] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [10] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238