A Forensic Framework for Tracing Phishers
نویسندگان
چکیده
Identity theft – in particular through phishing – has become a major threat to privacy and a valuable means for (organized) cybercrime. In this paper, we propose a forensic framework that allows for profiling and tracing of the agents involved in phishing networks. The key idea is to apply phishing methods against phishing agents. In order to profile and trace phishers, their databases are filled with fingerprinted credentials (indistinguishable from real ones) whose deployment lures phishers to a fake system that simulates the original service.
منابع مشابه
Forensic Linguistics and Forensic Phonetics: An Introduction
Communication is the essence of human civilization. Life would not have been possible without this cognitive faculty. However, with evolution in civilization instances of criminal activities are also on the increase. This paper introduces one such scientific discipline which has the potential to provide an authentic framework for such identifications. It is called Forensic Linguistics. Each ind...
متن کاملVoIP Forensic Analyzer
People have been utilizing Voice over Internet Protocol (VoIP) in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of nextgeneration communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges...
متن کاملClassification of Phishers
Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...
متن کاملEfficient Forensic Analysis for Anonymous Attack in Secure Content Distribution
This article discusses a forensic technology that is used to defend against piracy for secure multimedia content distribution. In particular we are interested in anonymous rebroadcasting type of attack where the attackers redistribute the per-content encrypting key or decrypted plain content. Traitor tracing technology can be used to defend against this attack by identifying the original users ...
متن کاملVideo Forensic Marking Algorithm using Peak Position Modulation
Forensic marking, a type of watermarking, is an efficient means of detecting copyright violation and tracing unauthorized access to digital content. In this paper, a new video forensic marking algorithm is proposed which uses peak position modulation (PPM) and can embed sufficient information to trace an illegal distributor. PPM uses the positions of correlation peaks, which are modulated by us...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007