Tracking Phishing Attacks Over Time

被引:54
作者
Cui, Qian [1 ]
Jourdan, Guy-Vincent [1 ]
Bochmann, Gregor, V [1 ]
Couturier, Russell [2 ]
Onut, Iosif-Viorel [3 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] IBM Secur, CTO Forens, Atlanta, GA USA
[3] IBM Ctr Adv Studies, Principal R&D Strategist, Ottawa, ON, Canada
来源
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) | 2017年
基金
加拿大自然科学与工程研究理事会;
关键词
Phishing Detection; Clustering;
D O I
10.1145/3038912.3052654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The so-called "phishing" attacks are one of the important threats to individuals and corporations in today's Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found that over 90% of these attacks were actually replicas or variations of other attacks in the database. This provides several opportunities and insights for the fight against phishing: first, quickly and efficiently detecting replicas is a very effective prevention tool. We detail one such tool in this paper. Second, the widely held belief that phishing attacks are dealt with promptly is but an illusion. We have recorded numerous attacks that stay active throughout our observation period. This shows that the current prevention techniques are ineffective and need to be overhauled. We provide some suggestions in this direction. Third, our observation give a new perspective into the modus operandi of attackers. In particular, some of our observations suggest that a small group of attackers could be behind a large part of the current attacks. Taking down that group could potentially have a large impact on the phishing attacks observed today.
引用
收藏
页码:667 / 676
页数:10
相关论文
共 28 条
  • [1] PhishZoo: Detecting Phishing Websites By Looking at Them
    Afroz, Sadia
    Greenstadt, Rachel
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 368 - 375
  • [2] [Anonymous], 2008, NDSS
  • [3] [Anonymous], 2005, SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania
  • [4] [Anonymous], 2014, GLOB PHISH REP 2H 20, VAnti-Phishing Working Group
  • [5] [Anonymous], FEDERAL INFORM PROCE
  • [6] Anti-Phishing Working Group, PHISH ACT TRENDS REP
  • [7] Chang E.H., 2013, IT Convergence and Security (ICITCS), 2013 International Conference on, P1
  • [8] Detecting Visually Similar Web Pages: Application to Phishing Detection
    Chen, Teh-Chung
    Dick, Scott
    Miller, James
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2010, 10 (02)
  • [9] Garera S, 2007, WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, P1
  • [10] Gastellier-Prevost S., 2011, Network and Information Systems Security (SAR-SSI), 2011 Conference on, P1, DOI DOI 10.1109/SAR-SSI.2011.5931389