The consequence of non-cooperation in the ght against phishing

نویسندگان

  • Tyler Moore
  • Richard Clayton
چکیده

A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This ‘take-down’ is often subcontracted to specialist companies. We analyse six months of ‘feeds’ of phishing website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry – where sharing prevails – and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بررسی سرولوژی ویروس سرخجه در زنان داوطلب ازدواج مراجعه کننده به مرکز بهداشت شهرستان همدان

Introduction & Objective: Despite mild and self limited manifestation of rubella , involvement of fetus as a consequence of prenatal infection is very important and can lead to congenital rubella syndrome (Cs). The aim of this study was the evaluation of immunity rate against rubella virus in women who were in child bearing ages. Materials & Methods: This survey was performed with cooperatio...

متن کامل

Phishing website detection using weighted feature line embedding

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

متن کامل

Detecting Fake Websites Using Swarm Intelligence Mechanism in Human Learning

The internet and its various services have made users to easily communicate with each other. Internet benefits including online business and e-commerce. E-commerce has boosted online sales and online auction types. Despite their many uses and benefits, the internet and their services have various challenges, such as information theft, which challenges the use of these services. Information thef...

متن کامل

International Convention on the Rights of Persons with Disability: Disability Inclusive Development and International Development Cooperation

The adoption of the International Convention on the Rights of Persons with Disabilities is a historical momentum for disabled persons and their associates, as well as ODA workers in the development cooperation field all over the world. For the last two decades, persons with disabilities, their associates and professionals working in this field have promoted their human rights, equality, nondisc...

متن کامل

A Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection

Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008