Anti-Phishing Approaches Lifeng Hu

Slides:



Advertisements
Similar presentations
PhishZoo: Detecting Phishing Websites By Looking at Them
Advertisements

Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Learning to Detect Phishing s
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Report : 鄭志欣 Advisor: Hsing-Kuo Pao 1 Learning to Detect Phishing s I. Fette, N. Sadeh, and A. Tomasic. Learning to detect phishing s. In Proceedings.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
A Crawler-based Study of Spyware on the Web Author: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, Henry M.Levy Presented At: NDSS, 2006 Prepared.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Best Web Directories and Search Engines Order Out of Chaos on the World Wide Web.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
What is the Internet? The Internet is a computer network connecting millions of computers all over the world It has no central control - works through.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Search Engine Optimization (SEO)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Detection of Internet Scam Using Logistic Regression
Norman SecureSurf Protect your users when surfing the Internet.
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
Web Evaluation Student Activity Created by Jodie Kleymeer, July 18, Updated July 25, Permission to view and use with credit given to author.
Internet safety By Lydia Snowden.
Presented By Jay Dani.  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine,
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PhishScore: Hacking Phishers’ Minds
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Internet Security facilities for secure communication.
Reliability & Desirability of Data
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
11 A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval Reporter: 林佳宜 /10/17.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Phishing Webpage Detection Jau-Yuan Chen COMS E6125 WHIM March 24, 2009.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
CCT355H5 F Presentation: Phishing November Jennifer Li.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Created by Jodie Kleymeer, July 18, Permission to view and use with credit given to author. Evaluating Web Resources Authority, Content, Objectivity,
Usable Privacy and Security and Mobile Social Services Jason Hong
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Week 1 Introduction to Search Engine Optimization.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
Search Engine Optimization Miami (SEO Services Miami in affordable budget)
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Anti-Spam Managing Spam with Kerio Connect
Information Architecture
Creating & Customizing Business for Sale Websites
Detection of Internet Scam Using Logistic Regression
ISYM 540 Current Topics in Information System Management
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Network security threats
Jon Peppler, Menlo Security Channels
​ SEO Birmingham
Ethics Tutorial Assignment#2
Introduction to Systems Security
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Agenda What is SEO ? How Do Search Engines Work? Measuring SEO success ? On Page SEO – Basic Practices? Technical SEO - Source Code. Off Page SEO – Social.
Presentation transcript:

Anti-Phishing Approaches Lifeng Hu

What is Phishing? An engineering attack An attempt to trick individuals into revealing personal credentials (uname, passwd, credit card info, etc) Based on faked and websites A threat for the internet users Damages - 73 million US adults received more than 50 phishing s a year - $2.8 billion loss a year

Phishing Methods Establish websites having similar interface/URL as famous websites Establish cheating websites to get users’ personal information Establish transparent website between original websites and users Send s containing malicious URL Send s containing embed malicious flash/picture files to avoid text checking of anti- phishing

False positive/negative rate of Anti-Phishing Approaches False negative rate: the rate of phishing websites being regarded as good in all phishing websites False positive rate: the rate of good websites being regarded as phishing in all good websites So, the lower false rates are, the better Anti-Phishing approach is

Anti-Phishing Approaches for Specific Websites Typically, designed by website companies An example is Sitekey mechanism of BankOfAmerica online Pro: False negative rate is low False positive rate can be zero Con: Not applicable for phishing s

Anti-Phishing Approaches Based on Database Anti-phishing Firewall : Kaspersky Anti-phishing Toolbar : Netcraft All based on on-line database Toolbar can provide URL statistics data in advance Pro: Applicable for both websites and s False negative rate can be low False positive rate is low Con: Need frequent updates Relatively hard to implement False negative rate increases if not up-to-date

Anti-Phishing Approaches Based on Content PILFER: phishing detection based on machine-learning combining 10 filters: - IP based URL: /paypal.cgi?fix=account - Domain age from whois.net - Non-matching URL: paypal.com - HTML hidden URLs - Malicious JavaScript - … Pro: Practically, false positive and negative rate are relative low Machine learning methods make it possible to improve accuracy No constant update is needed Con: Still need updates on training data and filters to adapt new styles of phishing s Network cost is a problem

Anti-Phishing Approaches Based on Content (cont.) CANTINA: phishing website detection based on TF-IDF weight - TF: the number of times a given term appears in a specific document - IDF: a measure of the general importance of the term in all documents - TF-IDF = TF/IDF, specifies term with frequency in a given document - Search five top TF-IDF words of current web page in search engine such as Google - Current web page should be in top N (30) search results to be legitimate CANTINA also uses filters similar to PILFER to decrease false positive Pro: False positive and negative rate are very low No constant update is needed Search engine ranking is relative hard to cheat Con:Network cost is a problem Too many phishing website searches may affect phishing websites’ ranking

Summary of mentioned Anti-Phishing Approaches Anti-Phishing ApproachesFalse PositiveFalse Negative Implement Effort Adaptation Update Cycle For Specific WebsitesZeroLowEasySpecific WebsiteNone Firewall Based on DatabaseLowMedium General Web/ Very Frequently Toolbar Based on DatabaseLow Hard General Web/ Very Frequently PILFERLow MediumGeneral Sometimes CANTINAVery LowLowMedium General Websites Few

Thanks!