Geo-Phisher: The Design of a Global Phishing Trend Visualization Tool

نویسندگان

  • Leah Zhang-Kennedy
  • Elias Fares
  • Sonia Chiasson
  • Robert Biddle
چکیده

Phishing is a significant type of internet crime that tricks users into giving up their personal and financial information. To combat phishing, browser manufacturers, software vendors, and organizations have compiled repositories of phishing URLs (blacklists). These lists enable the analysis of reported phishing attacks to be shared among antiphishing communities to gain awareness of evolving phishing trends. For example, during the third quarter of 2014, the Anti-Phishing Working Group (APWG) received approximately 50,000 unique phishing e-mail reports from consumers monthly, targeting more than 500 unique brands [1]. This data is analyzed and released as a quarterly report. To assist in the analysis of phishing blacklist data, we propose an information visualization tool called Geo-Phisher (available online at [4]). The application features a scatterplot map interface that plots the temporal and geographical information of phishing URLs. Applied to blacklist data from the APWG [3], the prototype reveals several interesting patterns in hosting locations of phishing URLs and distributions of the top phished brands across the globe.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behind Phishing: An Examination of Phisher Modi Operandi

Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine the anatomy of phishing URLs and domains, registration of phishing domains and time to activation, and the machines used to host the phishing sites. Our findings can be used as heuristics in filtering phishing-related ...

متن کامل

Distributed Phishing Attacks

We identify and describe a new type of phishing attack that circumvents what is probably today’s most efficient defense mechanism in the war against phishing, namely the shutting down of sites run by the phisher. This attack is carried out using what we call a distributed phishing attack (DPA). The attack works by a per-victim personalization of the location of sites collecting credentials and ...

متن کامل

Social Phishing

Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...

متن کامل

Password Rescue: A New Approach to Phishing Prevention

A phishing attack exploits both the enormous scale of the web and the fact that users are often enormously confused about what they can trust. Scale allows the phisher to get many responses to his attack, even though the probability of any given user responding is low (it costs the phisher no more to send a million emails than to send one). The enormous confusion about trust allows the phisher ...

متن کامل

Using one-time passwords to prevent password phishing attacks

Phishing is now a serious threat to the security of Internet users’ confidential information. Basically, an attacker (phisher) tricks people into divulging sensitive information by sending fake messages to a large number of users at random. Unsuspecting users who follow the instruction in the messages are directed to well-built spoofed web pages and asked to provide sensitive information, which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015