A Potential IRI based Phishing Obfuscation Strategy and Counter Measures
نویسندگان
چکیده
We anticipate a potential phishing strategy by obfuscation of Web links using Internationalized Resource Identifier (IRI). In the IRI scheme, the glyphs of many characters look very similar while their Unicodes are different. Hence, certain different IRIs may show high similarity. Therefore, it is quite difficult for normal Web users to distinguish them. The potential phishing attacks based on this strategy are very likely to happen in the near future with the boosting utilization of IRI. We invent a detection approach to this phishing strategy. We construct a Unicode character similarity list based on their visual similarity and semantic similarity. We use Nondeterministic Finite Automaton (NFA) model to identify the potential IRI based phishing patterns. We build the phishing IRI pattern generation system, by which, NFA could be further represented with regular expression (RE) to adapt it to anit-phishing systems. And we also propose a framework to build such anti-phishing systems.
منابع مشابه
A Potential IRI Based Phishing Strategy
We anticipate a potential phishing strategy by obfuscation of Web links using Internationalized Resource Identifier (IRI). In the IRI scheme, the glyphs of many characters look very similar while their Unicodes are different. Hence, certain different IRIs may show high similarity. The potential phishing attacks based on this strategy are very likely to happen in the near future with the boostin...
متن کاملAnalysis of Back-Doored Phishing Kits
This paper analyzes the “back-doored” phishing kits distributed by the infamous Mr-Brain hacking group of Morocco. These phishing kits allow an additional tier of cyber criminals to access the credentials of Internet victims. Several drop email obfuscation methods used by the hacking group are also discussed.
متن کاملAnalyzing and Detecting Phishing Webpages with Visual Similarity Assessment Based on Earth Mover’s Distance with Linear Programming Model
Phishing is an emerging type of social engineering crime on the Web. Most phishers initiates attacks by sending emails to potential victims. These emails lure users to access fake websites, and induce them to expose sensitive and/or private information. The rapid development and evolution of phishing techniques pose a big challenge in Web identity security for computer science researchers in bo...
متن کاملPhishing counter measures and their effectiveness - literature review
Purpose – Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publ...
متن کاملPoster: Lightweight Content-based Phishing Detection
I. INTRODUCTION Increasing use of Internet banking and shopping by a broad spectrum of users results in greater potential profits from phishing attacks. Phish are fake websites that masquerade as legitimate sites, to trick unsuspecting users into sharing sensitive information: credentials, passwords, financial information, or other personal information that can enable fraud. This threat is espe...
متن کامل