Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against Phishing
نویسندگان
چکیده
Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks, classical blacklist based approaches are not su cient to protect online users. While attackers manage to achieve high similarity between original and fraudulent websites, this fact can also be used for attack detection. In many cases attackers try to make the Internet address (URL) from a website look similar to the original. In this work, we present a way of using the URL itself for automated detection of phishing websites by extracting and verifying di erent terms of a URL using search engine spelling recommendation. We evaluate our concept against a large test set of 8730 real phishing URLs. In addition, we collected scores for the visual quality of a subset of those attacks to be able to compare the performance of our tests for di erent attack qualities. Results suggest that our heuristics are able to mark 54.3% of the malicious URLs as suspicious. With increasing visual quality of the phishing websites, the number of URL characteristics that allow a detection increases, as well.
منابع مشابه
Learning to Detect Phishing Webpages
Phishing has become a lucrative business for cyber criminals whose victims range from end users to large corporations and government organizations. Though Internet users are generally becoming more aware of phishing websites, cyber scammers come up with novel schemes that circumvent phishing filters and often succeed in fooling even savvy users. Recent studies to detect phishing and malicious w...
متن کاملReal-time Detection of Phishing Tweets
Twitter is an immensely popular social networking site and micro blogging service where people post short messages of 140 characters called tweets. Phishers have started using Twitter as a medium to spread phishing scams because of the fast spread of information. We deployed our system for end users by providing an easy to use “Web framework” which takes the tweet id and the specific keyword, a...
متن کاملIt’s All in the Name: Why Some URLs are More Vulnerable to Typosquatting
Typosquatting is a blackhat practice that relies on human error and low-cost domain registrations to hijack legitimate traffic from well-established websites. The technique is typically used for phishing, driving traffic towards competitors or disseminating indecent or malicious content and as such remains a concern for businesses. We take a fresh new look at this well-studied phenomenon to exp...
متن کاملA Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection
Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...
متن کاملA Review on Phishing URL Detection using Machine Learning Systems
Seeking sensitive user data in the form of online banking user-id and passwords or credit card information, which may then be used by ‘phishers’ for their own personal gain is the primary objective of the phishing e-mails. With the increase in the online trading activities, there has been a phenomenal increase in the phishing scams which have now started achieving monstrous proportions. This pa...
متن کامل