A Framework for Detection and Measurement of Phishing Attacks

被引:0
作者
Garera, Sujata [1 ]
Provos, Niels
Chew, Monica
Rubin, Aviel D. [1 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
来源
WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE | 2007年
关键词
Phishing; URL Obfuscation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries to lure her victim into clicking a URL pointing to a rogue page. In this paper, we focus on studying the structure of URLs employed in various phishing attacks. We find that it is often possible to tell whether or not a URL belongs to a phishing attack without requiring any knowledge of the corresponding page data. We describe several features that can be used to distinguish a phishing URL from a benign one. These features are used to model a logistic regression filter that is efficient and has a high accuracy. We use this filter to perform thorough measurements on several million URLs and quantify the prevalence of phishing on the Internet today.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 24 条
[1]  
[Anonymous], 1989, Applied Logistic Regression
[2]  
Blachman N., GOOGLE GUIDE MAKING
[3]  
CLAYTON R, 2005, INSECURE REAL WORLD
[4]  
*CORESTREET, SPOOFST
[5]  
Dhamija R, 2005, LECT NOTES COMPUT SC, V3517, P127
[6]  
Dhamija R., 2005, SOUPS 05, P77, DOI DOI 10.1145/1073001.1073009
[7]  
DHAMIJA R, 2006, CHI 06, P581
[8]  
DOSHI S, 2006, FRAMEWORK DETECTION
[9]   Consistent, yet anonymous, Web access with LPWA [J].
Gabber, E ;
Gibbons, PB ;
Kristol, DM ;
Matias, Y ;
Mayer, A .
COMMUNICATIONS OF THE ACM, 1999, 42 (02) :42-47
[10]  
*GOOGL, WEBM GUID