Phishing detection on tor hidden services

被引:6
作者
Steinebach, Martin [1 ]
Zenglein, Sascha [1 ]
Brandi, Katharina [1 ]
机构
[1] Fraunhofer SIT, Rheinstr 75, D-64295 Darmstadt, Germany
关键词
Tor; Phishing; Image hash; Cloning detection;
D O I
10.1016/j.fsidi.2021.301117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is the act of impersonating another party to attack a user, usually stealing information or money. In darknets, where participants are usually anonymous, phishing is a huge problem. We describe the current state of phishing in darknets, especially the Tor network. We analyse what techniques attackers can use to impersonate other services as well as develop some metrics to automatically detect phishing pages. Existing solutions against phishing are presented and phishing detection in the clearnet is examined on the transferability to darknets. (c) 2021 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:3
相关论文
共 13 条
[1]  
Ferreira R.P., 2018, IFIP ADV INF COMM TE, V3, P6
[2]  
Graner L., 2017, ARXIV PREPRINT ARXIV
[3]   Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks [J].
Gutierrez, Christopher N. ;
Kim, Taegyu ;
Della Corte, Raffaele ;
Avery, Jeffrey ;
Goldwasser, Dan ;
Cinque, Marcello ;
Bagchi, Saurabh .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) :988-1001
[4]   Malicious web domain identification using online credibility and performance data by considering the class imbalance issue [J].
Hu, Zhongyi ;
Chiong, Raymond ;
Pranata, Ilung ;
Bao, Yukun ;
Lin, Yuqing .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2019, 119 (03) :676-696
[5]   A machine learning based approach for phishing detection using hyperlinks information [J].
Jain, Ankit Kumar ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :2015-2028
[6]   Phishing Detection: A Literature Survey [J].
Khonji, Mahmoud ;
Iraqi, Youssef ;
Jones, Andrew .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04) :2091-2121
[7]  
Klinger E., 2010, TECHNICAL REPORT
[8]   Predicting phishing websites based on self-structuring neural network [J].
Mohammad, Rami M. ;
Thabtah, Fadi ;
McCluskey, Lee .
NEURAL COMPUTING & APPLICATIONS, 2014, 25 (02) :443-458
[9]   Detection of phishing websites using a novel twofold ensemble model [J].
Nagaraj K. ;
Bhattacharjee B. ;
Sridhar A. ;
Sharvani G.S. .
Journal of Systems and Information Technology, 2019, 20 (03) :321-357
[10]  
Oest A, 2018, PROCEEDINGS OF THE 2018 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P1