An information-sharing based anti-phishing system

被引:0
|
作者
Cheng, Yueqing [1 ]
Yuan, Zhen [1 ]
Ma, Lei [1 ]
Deng, Robert H. [2 ]
机构
[1] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[2] Singapore Management Univ, Singapore, Singapore
关键词
D O I
10.1109/ISDPE.2007.65
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the design of an information sharing based or server-assisted anti-phishing system. The system follows a client-server architecture and makes decision based on not only client side heuristics but also collective information from multiple clients. When visiting a web site, a client side proxy, installed as a plug-in to a browser, decides on the legitimacy of the web site based on a combination of white list, black list and heuristics. In case the client side proxy does not have sufficient information to make a clear judgment, it reports the suspicious site to a central server which has access to more complete and up to date information and is in a much better position than individual clients to make informed decisions. Our system is designed to counter against deceptive phishing as well as DNS-hijack attack.
引用
收藏
页码:265 / +
页数:3
相关论文
共 50 条
  • [21] A Design of an Anti-Phishing Training System Collaborated with Multiple Organizations
    Higashino, Masayuki
    [J]. IIWAS2019: THE 21ST INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2019, : 589 - 592
  • [22] Analysis and improvement of anti-phishing schemes
    Florencio, Dinei
    Herley, Cormac
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 148 - +
  • [23] Time Up for Phishing with Effective Anti-Phishing Research Strategies
    Chaudhary, Sunil
    Berki, Eleni
    Li, Linfeng
    Valtanen, Juri
    [J]. INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2015, 6 (02) : 49 - 64
  • [24] Anti-phishing by smart mobile device
    Han, Weili
    Wang, Yi
    Cao, Ye
    Zhou, Jiping
    Wang, Lixing
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 295 - 300
  • [25] Usability evaluation of anti-phishing toolbars
    Linfeng Li
    Marko Helenius
    [J]. Journal in Computer Virology, 2007, 3 (2): : 163 - 184
  • [26] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184
  • [27] Mobile anti-phishing: Approaches and challenges
    Shahriar, Hossain
    Zhang, Chi
    Dunn, Stephen
    Bronte, Robert
    Sahlan, Atef
    Tarmissi, Khaled
    [J]. INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 178 - 193
  • [28] Visual security is feeble for Anti-Phishing
    Leung, Chun-Ming
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123
  • [29] NoPhish: An anti-phishing education app
    Technische Universität Darmstadt, Germany
    [J]. Lect. Notes Comput. Sci, (188-192):
  • [30] Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
    Gupta, Srishti
    Kumaraguru, Ponnurangam
    [J]. PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,