Presented By Jay Dani.  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine,

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Microsoft TM SharePoint Content Management SystemTutorial By Mazen Abdallah Student Assistant at CNS 2010.
® Microsoft Office 2010 Browser and Basics.
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
Papers on Web-based Fraud and Identity Theft Kevin Kane Design and Analysis of Secure Protocols Fall 2004.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
Internet Phishing Not the kind of Fishing you are used to.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation. All.
1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Spoofing Rafael Sabino 10/28/2004. Introduction What is spoofing? Context and Security relevant decisions Phishing Web spoofing Remedies.
PORTIA Project 1 Mitigating Online ID Theft: Phishing and Spyware Students:Blake Ross, Collin Jackson, Nick Miyake, Yuka Teraguchi, Robert Ladesma, Andrew.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
How the World Wide Web Works
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Norman SecureSurf Protect your users when surfing the Internet.
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Windows Tutorial 4 Working with the Internet and
Internet Browsing the world. Browse Internet Course contents Overview: Browsing the world Lesson 1: Internet Explorer Lesson 2: Save a link for future.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
Anti-Phishing Approaches Lifeng Hu
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
Lesson 1 What Is the World Wide Web?. Objectives Upon completion of this lesson, you should be able to: Explain what the World Wide Web is and how it.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
11 A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval Reporter: 林佳宜 /10/17.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
XP Browser and Basics COM111 Introduction to Computer Applications.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
XP New Perspectives on Microsoft Windows XP Tutorial 5 1 Microsoft Windows XP Bringing the World Wide Web to the Desktop Tutorial 5.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Internet Searching the World Wide Web. The Internet and the World Wide Web The Internet is a worldwide collection of networks that allows people to communicate.
What Is Firefox? __________ is a Web ___________ that you use to search for and view Web pages, save pages for use in the future, and maintain a list.
Windows Internet Explorer 8- Illustrated Essentials Unit A – Getting Started with Internet Explorer 8 Finding and Navigating a Web Site.
1 Microsoft Office 2010 Basics and the Internet Microsoft Office 2010 Introductory Pasewark & Pasewark.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Tutorial 5 Protecting Your Computer
MicrosoftTM SharePoint Content Management SystemTutorial
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Presented By Jay Dani

 Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine, and observe all information entered into forms by the victim.  Web Spoofing works on the major browsers.  The attack is implemented using JavaScript and Web server plug-ins

 Spoof site: the site or page that is a malicious copy of some legitimate web site  Attacker: the person or organization who set up the spoof site  Honest site: the legitimate site that is been spoofed  The key to this attack is for the attacker's Web server to sit between the victim and the rest of the Web. This kind of arrangement is called a "man in the middle attack" in the security literature.

 Attackers server is on  The user wants to visit  The attacker will rewrite the URL by adding http//:webmastersforum.com to the front of the URL For example will become

 By using the browser's "view source" feature, the victim can look at the HTML source for the currently displayed page.  By looking for rewritten URLs in the HTML source, the victim can spot the attack.  Unfortunately HTML source is hard for novice users to read, and very few Web surfers bother to look at the HTML source for documents they are visiting

 Logos: spoof site uses the logos found in the honest website to imitate its appearance  Suspicious URL’S: spoof sites are located in server that has no relationship with the honest site  User input: Spoof sites contain messages to fool the user into entering sensitive information like password, SSN etc.  Short lived: most of the spoof sites are short lived i.e available for a few hours a day.

 Make it invisible  Taking down phishing web pages  Filtering out phishing  Detecting phishing web pages (SpoofGuard, etc)  Provide better user interfaces  Extended certificate verification  Anti-phishing toolbars (SpoofGuard, eBay, Netcraft, etc)

 Spoof Guard is a tool to help prevent a form of malicious attack called "web spoofing" or "phishing."  Spoof Guard is a browser plug in that is compatible with Microsoft Internet Explorer  Spoof Guard places a traffic light in the browser toolbar that turns from green to yellow to red as the user navigate to a spoof site.  If the user try to enter sensitive information into a form from a spoof site, Spoof Guard will save the data and warn the user.

 Warn bar: All the site information and post data check is carried out here.  Reflection Wnd: Transparent window that sits on top of the toolbar. Warn bar requests the Reflection Wnd to pop up a warning message when user tries to send a sensitive information to a suspicious server.  UW toolbar: it stores the user settings during runtime. Warn Bar requests UW ToolBar for these settings to determine the traffic lights color and the warning messages that appear in the Current Page Status dialog.

 Config dlg: opens an option window when user clicks the option button. UW ToolBar updates the user settings based on the result that Config Dlg returns when the window terminates.  DomainDlg: opens the Current Page Status window when the user clicks on the traffic light icon. It contains the warning messages specific to the current page.

Spoof guard toolbar has three buttons: 1. Status button: displays the current domain and a brief representation of the status(red, green or yellow) 2. Settings button: this brings up the settings dialogue 3. Reset button: removes all data collected by the spoof guard(but won’t remove the user’s internet explorer’s history)

 Spoof Guard compares the domain name of the attempted URL to the domains in the most recent browser history entries.  A careless user attempting to visit may think that he is visiting

 CANTINA uses a simple content-based approach  Examines content of a web page and creates a “fingerprint”  Sends that fingerprint as a query to a search engine  Sees if the web page in question is in the top search results ▪ If so, then it is a legitimate web page ▪ Otherwise, it is a phishing web page  Properties:  Fast  Scales well  No maintenance (done by search engines)  Highly accurate

 Given a web page, calculate TF-IDF (Term Frequency / Inverse Document Frequency) score for each word in that page  Take five words with highest TF-IDF weights  Feed these five words into a search engine (Google)  If domain name of current web page is in top N search results, we consider it legitimate  N=30 worked well  No improvement by increasing N

 Like virus detection and spam filtering, we expect that any serious effort to combat web spoofing will lead to more sophisticated spoofs and the need for more sophisticated defenses.  From a broader perspective, web spoofing takes advantage of the unauthenticated and weak web- site authentication.  If challenge-response methods, for example, were widely deployed, then a spoof site authenticating a user would not have any way to impersonate the user on the honest site.

 “Client-side defense against web-based identity theft” by Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh and John C. Mitchell, 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February  “CANTINA: A Content-Based Approach to Detecting Phishing Web Sites” by Yue Zhang, Jason Hong, Lorrie Cranor,  “Web Spoofing” by Yougu Yuan, Eileen Zishuang Ye, Sean Smith, Department of Computer Science/Institute for Security Technology Studies, Dartmouth College, July  “Do Security Toolbars Actually Prevent Phishing Attacks?” by Min Wu, Robert Miller, Simson Garfinkel, MIT CSAIL, MA