A Forensic Framework for Tracing Phishers

نویسندگان

  • Sebastian Gajek
  • Ahmad-Reza Sadeghi
چکیده

Identity theft – in particular through phishing – has become a major threat to privacy and a valuable means for (organized) cybercrime. In this paper, we propose a forensic framework that allows for profiling and tracing of the agents involved in phishing networks. The key idea is to apply phishing methods against phishing agents. In order to profile and trace phishers, their databases are filled with fingerprinted credentials (indistinguishable from real ones) whose deployment lures phishers to a fake system that simulates the original service.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensic Linguistics and Forensic Phonetics: An Introduction

Communication is the essence of human civilization. Life would not have been possible without this cognitive faculty. However, with evolution in civilization instances of criminal activities are also on the increase. This paper introduces one such scientific discipline which has the potential to provide an authentic framework for such identifications. It is called Forensic Linguistics. Each ind...

متن کامل

VoIP Forensic Analyzer

People have been utilizing Voice over Internet Protocol (VoIP) in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of nextgeneration communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges...

متن کامل

Classification of Phishers

Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...

متن کامل

Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution

This article discusses a forensic technology that is used to defend against piracy for secure multimedia content distribution. In particular we are interested in anonymous rebroadcasting type of attack where the attackers redistribute the per-content encrypting key or decrypted plain content. Traitor tracing technology can be used to defend against this attack by identifying the original users ...

متن کامل

Video Forensic Marking Algorithm using Peak Position Modulation

Forensic marking, a type of watermarking, is an efficient means of detecting copyright violation and tracing unauthorized access to digital content. In this paper, a new video forensic marking algorithm is proposed which uses peak position modulation (PPM) and can embed sufficient information to trace an illegal distributor. PPM uses the positions of correlation peaks, which are modulated by us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007