Download presentation
Presentation is loading. Please wait.
Published byAlberta Sabrina Bishop Modified over 9 years ago
1
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
2
OUTLINE Introduction Our Approach Experimental Evaluation Conclusion And something else
3
Introduction – Phishing
4
Introduction – Related Work Email level solution ◦ Filters and content-analysis Browser-integrated solution ◦ SpoofGuard SpoofGuard ◦ PwdHash ◦ AntiPhish Keeps track of sensitive information ◦ DOMAntiPhish Compared the DOMs of the pages
5
Introduction – Related Work(cont.) But the most popular and widely- deployed solutions are based on the use of blacklists. ◦ IE 7 browser ◦ Google Safe Browsing ◦ NetCraft tool bar ◦ eBay tool bar ◦..etc
6
Introduction – Why Phishing Works Why Phishing Works Proc. CHI (2006) Why Phishing Works Proc. CHI (2006) ◦ SMTP does not contain any authentication mechanisms. ◦ About two million users gave information to spoofed websites resulting in direct losses of $1.2 billion (2003) ◦ 23% users base their trust only on page content
7
Introduction – Why Phishing Works(cont.) APWG detected more than 25,000 unique phishing URLs in Dec. 2007. “Do-it-yourself” phishing kits are being made available for download free of charge from the internet. More sophisticated phishing attacks. ◦ Application-level vulnerability Application-level vulnerability
8
Our Approach Base on browser plugin ◦ AntiPhish ◦ DOMAntiPhish Comparing the visual similarity
9
Our Approach – Signature Extraction Three features ◦ Text pieces Content, color, size, font family, position ◦ Images embedded in the page Src value, area, color, Haar compression, position ◦ Overall visual appearance of the page Color and Haar compressionHaar compression Page signature: S(w) =
10
Our Approach – Signature comparison Similarity between textual contents: d l (T, Tˆ): Levenshtein distance Similarity betwwen colors: L 1 (C,Cˆ): 1-norm distance
11
Our Approach – Signature comparison Home banking Welcome! Copyright 2007 t 1 = t 2 = t 3 =
12
Our Approach – Signature comparison Your banking Welcome! T 1 = T 2 =
13
Our Approach – Signature comparison t 1 = T 1 =
14
Our Approach – Signature Similarity score s t : average the largest n elements of the S t Final similarity score: ◦ s = a t s t + a i s i + a o s o ◦ Threshold d Two pages are similar if and only if s ≥ d
15
Experimental Evaluation Web page dissimilarity level ◦ Level 0: almost perfect visual match ◦ Level 1: some different element ◦ Level 2: noticeable differences Dataset ◦ 41 positive pairs (from PhishTank) ◦ 161 negative pairs (common web pages)
16
Experimental Evaluation(cont.) Training set ◦ 14 positive paris and 21 negative pairs e k = 0, true positive or true negative |s - d|, otherwise ◦ s = a t s t + a i s i + a o s o a t = 2.11, a i = 0.11, a o = 1.20 Threshold d = 0.956
17
Experimental Evaluation(cont.)
18
Figure 2: One of the two missed positive pairs
19
Experimental Evaluation(cont.) Environment ◦ Dual AMD Opteron 64, 8GB RAM, Linux OS Computation Time ◦ 3.8 sec for positive pairs ◦ A few milliseconds for negative pairs after optimization
20
Conclusion A comparison technique that eliminates the shortcomings of AntiPhish and DOMAntiPhish Can also be integrated into any other anti-phishing system that can provide a list of legitimate sites
21
And something else Visual similarity-based phishing detection without victim site information CICS '09. IEEECICS '09. IEEE Visual Similarity between Phished Sites Virtual screen of X window to display a web browser Use ImgSeek to find similar images
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.