Detecting Phishing in Emails Srikanth Palla Ram Dantu University of North Texas, Denton.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Using “Account-free” Services to Combat Phishing, Brand Infringement, and Other Online Threats Qi-fense LLC © 2009 Sebastian Holst
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Threats To A Computer Network
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
Phishing – Read Behind The Lines Veljko Pejović
The OWASP Foundation OWASP Chennai Phishing.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
1 The Business Case for DomainKeys Identified Mail.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
PhishScore: Hacking Phishers’ Minds
Mail Services.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
1 Getting A Hook On Phishing Laurie Werner Miami University Chuck Frank Northern Kentucky University.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Content Control Stewart Duncan Technical Manager.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Phishing Webpage Detection Jau-Yuan Chen COMS E6125 WHIM March 24, 2009.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
How Phishing Works Prof. Vipul Chudasama.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Security fundamentals Topic 9 Securing internet messaging.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Understand Protection LESSON Security Fundamentals.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Done by… Hanoof Al-Khaldi Information Assurance
Computer Data Security & Privacy
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Information Security Session October 24, 2005
Protection Mechanisms in Security Management
Cybersecurity Simplified: Phishing
Characterizing Pixel Tracking through the Lens of Disposable Services
Presentation transcript:

Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton

What is Phishing?  Phishing is a form of online identity theft  Employs both social engineering and technical subterfuge  Targets consumers' personal identity data and financial account credentials such as credit card numbers, account usernames, passwords and social security numbers.  Social-engineering schemes use 'spoofed' s to lead consumers to counterfeit websites. -Anti Phishing Working Group (APWG)

Phishing Tactics  Hijacking reputable brand names  Creating a plausible premise  Redirecting URL’s  Collecting confidential information through s

Do we need to restrict Phishing attacks?

The Statistics… Sources: Anti Phishing Working Group

Problems with Current Spam Filtering Techniques  Current spam filters focus on analyzing the content  Majority of the Phishers obfuscate their content to bypass the filters  Labels an as BULK and expect the recipients’ to make a decision on the authenticity of the source  Current spam filters have high degree of false positives

Methodology Our method examines:  The header of the (not content)  The social network of the recipient  Credibility of the source  Classifies Phishers as:  Prospective Phishers  Recent Phishers  Suspects  Serial Phishers

Traffic Profile The following Figure describes the incoming traffic profiles based on number of recipients and how often they receive the message.

Corpus Traffic Profile  Our analysis requires sent folder of the recipient  s provided in the TREC evaluation tool kit are spam and non spam s  We require a mix of legitimate and phising s to evaluate our filter  We have analyzed a live corpus of 13,843 s, collected over 2.5 years. This corpus has a mix of legitimate, spam and phishing s. Different categories of s are shown in the figure

Experimental Setup  We deployed our classifier on a recipient’s local machine running an IMAP proxy and thunderbird (MUA).  All the recipient’s s were fed directly into our classifier by the proxy.  Our classifier periodically scans the user’s mailbox files for any new incoming s.  DNS-based header analysis, social network analysis, wantedness analysis were performed on each of the s.  The end result is tagging of s as either Phishing, Opt-outs, Socially distinct and Socially close.

Architecture The architecture model of our classifier consists of three analyses  Step 1: DNS-based header analysis  Step 2: Social network analysis  Step 3: Wantedness analysis  Step 4: Classification

Step 1: DNS-based Header Analysis Stage 1: In this step, we validate the information provided in the header: the hostname position of the sender, the mail server and the relays in the rest of the path. We divide the entire corpus into two buckets.  The s which are valid for DNS lookups (Bucket 1).  The s which are not valid for DNS lookups (Bucket 2). Stage 2: This step involves doing DNS lookup on the hostname provided in the Received: lines of the header and matching the IP address returned, with the IP address which is stored next to the hostname, by the relays during the SMTP authorization process. Bucket 1 is further divided into:  Trusted bucket.  Untrusted bucket. We pass the Bucket2 and both trusted and untrusted buckets to the Social Network Analysis phase for further analysis.

Step 2: Social Network Analysis Each of the three buckets: bucket2, untrusted bucket and trusted bucket received from the DNS-based header analysis are treated with the rules formulated by analyzing the “sent” folder s of the receiver. For instance,  All s from trusted domains will be removed  Familiarity to sender’s community  Familiarity to the path traversed The rules can be built as per the recipients’ filtering preferences.

Classification of Trusted and Untrusted Senders

Step 3: Wantedness Analysis Measuring the senders credibility (ρ):  We believe the credibility of a sender depends on the nature of his recent s  If the recent s sent by the sender are legitimate, his credibility increases  If the recent s from the sender are fraudulent, his fraudulency increases

Credibility Drops As Time Progresses for Untrusted Senders

Computing Credibility (ΔT legitimate s ) is the average time period of all legitimate w.r.t the most recent (ΔT fraudulent s ) is the average time period of all fraudulent s w.r.t the most recent

Credibility of Untrusted Senders

Measuring Recipient’s Wantedness  Tolerance (α + ) for a sender is more if the recipient reads and stores his s for longer period  Intolerance (β - ) for a sender is more if the recipient deletes his s with out reading them

Measuring Wantedness (ΔT legitimate s ) is the average time period of all legitimate w.r.t the most recent (ΔT fraudulent s ) is the average time period of all fraudulent s w.r.t the most recent T rd is the average storage time period of all the read s T urd is the average storage time period of all unread s

Wantedness of Trusted Senders

Classification  Classification of Phishers:  Credibility Vs Phishing Frequency  Classification of Trusted Senders:  Credibility Vs Wantedness

Classification of Phishers

Classification of Trusted Senders

Summary of Results # of sFalse PositivesFalse NegativesPrecision Corpus-I DNS Analysis % {[DNS Analysis] + [Social Network Analysis]} % {[DNS Analysis] + [Social Network Analysis]+ [Wantedness Analysis]} 563 (Domains) % Corpus-II DNS Analysis % {[DNS Analysis] + [Social Network Analysis]} % {[DNS Analysis] + [Social Network Analysis]+ [Wantedness Analysis]} % Precision is the percentage of messages that were classified as phishing that actually are phishing

Conclusions  Phishers use special software's to conceal the path taken by their s to reach the recipient. Most of the times the path length is single hop.  Our classifier can be used in conjunction with any existing spam filtering techniques for restricting spam and phishing s  Rather than labeling an as BULK, based on the sender’s credibility and his wantedness, we further classify them as:  Prospective phishers  Suspects  Recent phishers  Serial phishers  We classified two different corpuses with a precision of 98.4% and 99.2% respectively