Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
CPSC 203 Introduction to Computers Lab 39, 40 By Jie (Jeff) Gao.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Phishing for Phish in the Phispond A lab on understanding Phishing attacks and defenses … Group 21-B Sagar Mehta.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lecture 22: April 17, 2007 Browser-based Security and Privacy Tools.
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
CMU Usable Privacy and Security Laboratory A Brief History of Semantic Attacks or How Not to Get Screwed Online Serge Egelman.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
Dawn Pedersen Art Institute. Introduction All your hard design work will suffer in anonymity if people can't find your site. The most common way people.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PhishNet: Predictive Blacklisting to Detect Phishing Attacks Pawan Prakash Manish Kumar Ramana Rao Kompella Minaxi Gupta Purdue University, Indiana University.
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
CPSC203 Introduction to Computers Lab 69 By Jie Gao.
Reliability & Desirability of Data
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
CPSC 203 Introduction to Computers Lab 23 By Jie Gao.
Anti-Phishing Approaches Lifeng Hu
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
CPSC203 Introduction to Computers Lab 33 By Jie Gao.
Microsite Training. Today: Presentation (slides will be sent to the group) Examples with LRADGs microsite Troubleshooting Questions.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
76 © 1998, 1999, 2000 David T. Gray, Howard Duncan, Jane Kernan Frames When displaying information in a browser, it is sometimes useful to divide the display.
ITCS373: Internet Technology Lecture 5: More HTML.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
1 Double Click to Edit. Installing Evernote 22 First, download the installation software. Open your favorite web browser and visit the Evernote Web site.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004.
AGB 3/26/121 ++=. 2 Yes, believe it or not this is a complete webpage. It has a Head, Title and Body between the start and end HTML Tag.
Web Authoring with Dreamweaver. Unit Objectives  Be able to define keywords: HTML, HTTP (protocol), browser, web server, client/server, tag, attribute,
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
1 Phinding Phish : Evaluating Anti- Phishing Tools Yue Zhang,Jason Hong (2007) Carnegie Mellon University.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CISC103 Web Development Basics: Web site:
Web Development Web Servers.
Ways to protect yourself against hackers
ISYM 540 Current Topics in Information System Management
Conveying Trust Serge Egelman.
Mozilla Firefox Who is Mozilla? What is Firefox?
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
Phishing is a form of social engineering that attempts to steal sensitive information.
CISC103 Web Development Basics: Web site:
Title: Tech Training Certificate: Ace of Initiative Program
Presentation transcript:

Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen Graduate Student U Mass Lowell Dept. of Computer Science MIT Spam Conference March

Brief History The first known phishing attack on a financial operator was June 2001 against E-Gold. In 2004 phishing became a widespread attack and started to appear on the radar of technology crimes. Between 2004 and 2005, organized crime and phishers united to launch more attacks for profit.

Data gathered from

Tests Performed Test each technology against 10 real live phishing sites – Some URLs in blacklists Test those phishing sites copied to the lab – Lab URLs not in blacklists Create 10 phishing sites of my own in a lab – Viewing sites in IE7 view->source -> file -> save as – wget -p --convert-links --user-agent="Mozilla…

Limitations I did not decompile any anti-phishing technologies – my results are purely from Trial and Error I did not test enough phishing sites to make determinations regarding which anti-phishing filter is more effective at real phishing sites. Other papers in this are have done this. See: – – phishing.pdf phishing.pdf

Anti-Phishing Technologies Examined Internet Explorer 7.0 Netcraft’s Toolbar Earthlink’s Toolbar Geotrust Trustwatch SpoofGuard eBay’s Toolbar Firefox 2

Types of Anti-Phishing Technology URL Blacklists Content Filter URL Popularity & Characteristics Password recognition

URL Blacklists Similar idea as SPAM Blacklists – a database of URLs that are known phishing sites Pros: – Low false positives – Easy to lookup URLs (low overhead) – Effective once the URL is listed Cons: – “Time to list” is too large to keep phishers out of business – approx 10 hrs as of 2/08 (phishtank.com)

Content Filter Examines the body of each web page visited Pros: – Detects phishing sites as soon as phishers publish them Cons: – Higher overhead than other technologies (a small price to pay for the most users) – It is possible to learn the content rules and work around them

URL Popularity & Characteristics URL Popularity: Checks domains against Google, Alexa, etc. to see how popular the URL is. The basis is that phishing sites are not popular. URL Characteristics: Checks characteristics of the URL such as strange port numbers, recently registered domains, IP addresses, etc.

URL Popularity & Characteristics Pros: – Easy to lookup URL (low overhead) Cons: – Usually requires human interpretation of the indicator and requires the operator to be aware of what phishing is. – Privacy concerns – each site visited must be looked up at Google, Alexa, etc. – May not work well for phishing sites hosted at sites like geocities e.g.

Password recognition Pros: – Easy to detect (low overhead) Cons: – Assumes users never use the same password at more than one site – Requires users to enter passwords to all sites ahead of time

Details of IE7s Content Filter By using Trial and Error I was able to determine what IE7s content filter was looking for when detecting fake ebay.com sites: 2 input tags nested in a form tag and 3 links: – “forgot userid” link – “forgot password” link – “keep me signed in” link 1 or more of 10 links that point to ebay.com

Smallest Page that trips IE7s Content Filter

Details of Earthlinks Content Filter By using Trial and Error I was able to determine what Earthlinks content filter was looking for when detecting fake ebay.com sites: 2 input tags 2 or more of 14 links that point to ebay.com & 1.js file on ebay.com

Smallest Page that trips Earthlinks Content Filter Help Privacy Policy

Page Load Attack <?php while(1){ echo " "; flush(); sleep(1); } ?>

Image Load Attack.

JavaScript Attack function go() { var buf = "phishing site here" ; output.innerHTML = buf ; }

Attacks Against Anti-Phishing Filters Anti-Phishing Technology Page Load Attack Image Load Attack JavaScript Attack IE 7.0 (Content Filter / Blacklist) Yes / No Yes / N/A NetcraftNo N/A Earthlink (Content Filter / Blacklist) No / No Yes / No Yes / N/A GeotrustNo N/A SpoofGuardYes eBay’s ToolbarYes* N/A Firefox 2No N/A * The Page Load and Image Load attacks worked some of the time against eBay’s Toolbar. I was unable to determine why it worked with some URLs but not others.

Attacks against URL Blacklists Google’s blacklist: has similar entries that lead me to believe wildcards are not being used: similar results at

Attacks against URL Blacklists Using multiple subdomains, folders, etc. phishers already create many phishing URLs. It is possible to create infinitely many URLs by: Custom 404 error page (page not found) Apache rewrite rule RewriteEngine on RewriteRule ^[A-Za-z0-9]*$ phishing_page.html

Conclusions The best anti-phishing filters use a layered approach (URL Blacklist + Content Filter) – Use multiple phishing blacklists Future work: – Decompiling IE7 and Earthlink’s content filter to learn more about them If they use static rules, enhance them to use dynamic rules that can be controlled & updated centrally that would make it much harder for phishers to succeed Address the page/image load & JavaScript attacks

Questions and Comments?