Download presentation
Presentation is loading. Please wait.
Published byFrancis Cunningham Modified over 9 years ago
1
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma (rverma@uh.edu) ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks 12/20/2014 1
2
Digital Identity and Phishing 2
3
Classical Phishing Attacks Send email containing Bad link, and Loss, urgency, or incentive Plant a link Internet forums Social networks Chat or bulletin boards 12/20/2014 Verma - ICISS 2014 3
4
Hijack-based Attacks Hijack a legal server and plant a phishing page Install malware and when user types a legal target URL interpose a phishing page Note: The URL in the address bar is legal 12/20/2014 Verma - ICISS 2014 4
5
Motivation for Phishing Phishing causes loss of time, productivity and monetary loss which run to billions of dollars. Despite advances and research in phishing protection, number of victims of phishing is increasing every year. 5 Source: Gartner, Anti-Phishing Working Group, 2014.
6
Phishing Detection Dimensions Web site and address (URL) Web site only (e.g. “Account quota exceeded”) 12/20/2014 Verma - ICISS 2014 6 This Paper
7
Evolving Phishing Trends Phishing patterns are constantly evolving. So we want to detect phishing patterns based on the fundamental characteristics of a phishing website. 7
8
Characteristics of Phishing Website URL Content Behavior 8
9
URL Characteristics 9
10
Content Characteristics External sources of images, styles from target site, to mimic the appearance. Page Contents (Text) resemble target site Unencrypted sessions 10
11
Behavior Characteristics 11
12
Behavior Characteristics 12
13
Behavior Characteristics 13
14
Behavior Characteristics 14
15
Objective Distinguish characteristics of classical and hijack based phishing sites Develop an algorithm for detection 15
16
Approach 16 1 Develop Algorithm To detect characteristics 2 Test Algorithm Dataset from PhishTank, Alexa and DMOZ 3 Evaluate Algorithm Against Google Safe Browsing (GSB) Phishing detection
17
DEVELOPING THE ALGORITHM 17
18
Algorithm 18
19
URL Classifiers 19
20
URL Classifiers 20
21
URL Classifiers 21
22
Content Classifier 22
23
Behavior Classifier B1 – Real-time Form analysis Extracts action URL from forms with password fields Analyzes contents of action URL page 23
24
TESTING OF ALGORITHM 24
25
Testing of Algorithm Algorithm applied on dataset from PhishTank, Alexa and DMOZ Preprocessing of data was done before algorithm was applied. 25
26
Dataset 26
27
Preprocessing 27
28
Metrics 28 Classified as Phishing Classified as Legitimate Phishing pages TPFN Legitimate pages FPTN
29
Algorithm 29
30
Models URL Yes No U1 – Target in URL Yes No U2 – Misplaced TLD Yes No U3 – Gen. Characteristics of URL Yes No C1 – More Redirection Yes No C2 – Copy Detection Yes No C3 – Unsecure Pwd. Handling Yes No B1 – Realtime Form Analysis CombinationPhishing URL Condition OR ( U1 OR U2 OR U3 ) OR ( C1 OR C2 OR C3 OR B1 ) AND ( U1 OR U2 OR U3 ) AND ( C1 OR C2 OR C3 OR B1 ) Potential Site only (C1 OR C2 OR C3 OR B1) Yes >= 2
31
Performance of Classifiers on the dataset 31
32
Results 32 Com binati ons Search Based Filtering = OFFSearch Based Filtering = ON TPRFPRPRF-scoreTPRFPRPRF-score Or 99.97 3.5088.2593.75 93.37 0.5497.84 95.55 And87.64 1.8092.76 90.1382.30 0.2298.98 89.88 Pot.97.942.4891.24 94.47 91.550.3698.5294.91 Site only 99.313.4488.3793.5292.840.5397.8895.30
33
Discussion 33
34
Advantages of the Approach Can be used effectively in zero hour environment Can handle hijack based attacks, as they have behavioral analysis Content language independent. 34
35
EVALUATION OF ALGORITHM 35
36
Existing Methods Related phishing algorithms Blacklisting Xiang et al - hierarchical adaptive probabilistic approach CANTINA CANTINA+ Google Safe Browsing Good performance, but could not compare with my algorithm Closed source No API So used publically available Google Safe Browsing for evaluation. 36
37
Google Safe Browsing Large-scale automatic phishing website detection Analyzes both URL and content Claims accuracy of 90% and FPR of 0.1% 37
38
Direct Comparison 38 Model Com binati ons Search Based Filtering = OFFSearch Based Filtering = ON TPRFPRPRF-scoreTPRFPRPRF-score Ours 1 99.97 3.5088.2593.7593.370.5497.8495.55 2 87.641.8092.7690.1382.300.2298.9889.88 3 97.942.4891.2494.4791.550.3698.5294.91 GSB 51.460.03 99.8067.91
39
Security Analysis If phishers get hold of this work, then they might adapt to hide from the detection techniques. Buying genuine domain, SSL, using self signed or open-SSL can hamper some of the classifiers, but it will add to phishers’ efforts and it will reduce their profit. If phishers, somehow, manage to get good page rank, and higher position in search results, then they can escape from being detected. They can change the behavior of the page for hiding purposes, but this could alarm the users, and responsible users will report the URL 39
40
Conclusion Efficient algorithms based on the fundamental characteristics of phishing websites were developed. Algorithms have comparable or better efficacy with other established phishing detection algorithms. A novel approach to handle hijack based attacks. 40
41
Future Work Improve the Behavior classifier to include other phishing website behaviors. Deploy as a browser extension to test in-field performance. 41
42
Thank You Questions?
43
Hijack Based Phishing Attacks Agency for the Safety of Aerial Navigation in Africa and Madagascar (ASECNA) April 2014 Redirected to PayPal 43
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.