Markus Jakobsson School of Informatics Indiana University Bloomington, IN 47406, USA Jacob Ratkiewicz Dept. of Computer Science Indiana University Bloomington,

Slides:



Advertisements
Similar presentations
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Advertisements

Alert Driven Process Integration and Exception Handing: A Case Study on Audit Confirmation with Web Service Mandy Y.S. Tong Dept. of Computer Science,
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
Breaking Trust On The Internet
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Social Phishing Tom N. Jagatic Nathaniel A. Johnson Markus Jakobsson Filippo Menczer Presenter: Ieng-Fat Lam Date: 2007/4/1.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Extending Instant Messaging to Provide Pervasive Personal Communication Wei Li, Fredrik Kilander and Carl Gustaf Jansson {liwei, fk, Department.
Application Process USAJOBS – Application Manager USA STAFFING ® —OPM’S AUTOMATED HIRING TOOL FOR FEDERAL AGENCIES.
Google Docs & Sun City HH Computer Club Website
Social networking FACEBOOK AND TWITTER. Then In the beginning of Facebook, there were very few features. There were no status updates, messages, photo.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
May 2014 Zimele Technologies Customer convenience through mobile MDMS applications.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
An Evaluation of Planning and Scheduling Operations in Services A Thesis Proposal By Samuel Chukwuemeka Department of Computer Science Troy University.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
PhishScore: Hacking Phishers’ Minds
Introduction to our On-Line Self Service Center at
Invasive Browser Sniffing and Countermeasures Markus Jakobsson & Sid Stamm.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
GAA REGISTRATION SYSTEM. © GAA 2 Presentation title in footer INTRODUCTION  New online registration system developed by Servasport and the I.T. committee.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
Viruses & Destructive Programs
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
INTRODUCTION TO WORDPRESS. About WordPress The free service that we will use from WordPress is often used as blogging software – very little knowledge.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Phishing Webpage Detection Jau-Yuan Chen COMS E6125 WHIM March 24, 2009.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
ACCESSIBILITY VIOLATIONS CMPE 451 SPRING 2012 GROUP 5.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Report Automator Updated on 17, Mar Report Automator admanGo now provides a new function, Report Automator for users to generate Adspend Analysis.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
The spoofed . The spoofing The link appears as (i.e NOODLEBANK.com) But actually it links to
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
Order the featured book of the day Estimated effort: 2.
Introduction to Information Retrieval Example of information need in the context of the world wide web: “Find all documents containing information on computer.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
A threat to global security and economy Koushik Mannepalli CMPE 294.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
INTRODUCTION & QUESTIONS.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-commerce and Internet Users in Taiwan: Research Series, Wu, Tung-Xiung Dept. of Information Management, Shih Hsin University Taiwan, ROC.
Safe Computing Practices. What is behind a cyber attack? 1.
1 Logging into the new PCard (PaymentNet) System: PAYMENTNET * Introduction * May use IE 8.0 or greater or Firefox * Do not.
Make it easy for customers. Add Sitelinks AdWords Sitelinks. Increasing choice and relevancy in your Search ads.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
P&G Supplier Portal Training
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Prepared by Rao Umar Anwar For Detail information Visit my blog:
Spear Phishing Awareness
Wireless Spoofing Attacks on Mobile Devices
Chapter 9: Configuring Internet Explorer
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Security and JavaScript
Presentation transcript:

Markus Jakobsson School of Informatics Indiana University Bloomington, IN 47406, USA Jacob Ratkiewicz Dept. of Computer Science Indiana University Bloomington, IN 47406, USA Designing Ethical Phishing Experiments: A study of (ROT13) rOnl query features

Introduction Phishing Ethical & Accurate Experiment V.S. Attack status

Previous work Gartner Group 2004 servey $2.4 billion per year in the US alone Around 5% adult American Internet users are successfully targeted by phishing attacks each year Lower bound

Previous work Mailfrontier March ’05 (report) identified phishing s correctly 83% of the time identified legitimate s 52% of the time. Their conclusion Our believe

Techniques Monitoring of ongoing attacks Administrators Lower estimate Real Experiment Ethical & accurate

USER-TO-USER PHISHING ON RONL rOnl User-to-User Communication Third Party

USER-TO-USER PHISHING ON RONL Abusing User-to-User Communication Content injection attack Spoofing attack ContextAware Attacks

Content injection attack

Spoofing attack

ContextAware Attacks Purchase History Username / Correspondence

RONL PHISHING SCENARIOS Attack 1: Context-aware spoofing attack Attack 2: Contextless spoofing attack

Experimenting with Spoofing Experiment 1: context & Non-malicious link Experiment 2: No context & Non-malicious link

Experimenting with Spoofing

Experimenting with a Malicious Link Experiment 3: Context & Malicious link Experiment 4: No Context & Malicious link

Experimenting with a Malicious Link

Experiment Design Analysis

METHODOLOGY Identity Linkage 93 rOnl users (through the rOnl interface). 44 of the 93 users (47%) Automated Google searches with several queries limited to cgi.ronl.com(237)

Experimental Multi Accounts & Days Questions 1. Hi! How soon after payment do you ship? Thanks! 2. Hi, can you ship packages with insurance for an extra fee? Thanks. 3. HI CAN YOU DO OVERNIGHT SHIPPING?? 4. Hi - could I still get delivery before Christmas to a US address? Thanks!! (sent a few weeks before Christmas ’05).

Results

Questions