The consequence of non-cooperation in the fight against phishing

T. Moore, R. Clayton
{"title":"The consequence of non-cooperation in the fight against phishing","authors":"T. Moore, R. Clayton","doi":"10.1109/ECRIME.2008.4696968","DOIUrl":null,"url":null,"abstract":"A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the Websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry - where sharing prevails - and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"65","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 eCrime Researchers Summit","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECRIME.2008.4696968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 65

Abstract

A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the Websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry - where sharing prevails - and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
不合作打击网络钓鱼的后果
银行减轻网络钓鱼影响的一个关键方法是删除欺诈性网站或暂停使用滥用域名。这种数据攻击通常被转包给专业公司。我们分析了六个月来来自多个来源的钓鱼网站url的数据,其中包括两家这样的公司。我们证明,在每种情况下,其他人可能知道大量的网站,但拥有删除合同的公司仍然不知道它们,或者只是很晚才知道它们的存在。我们监控了所有网站,以确定它们何时被删除,并计算删除公司在不知道他们应该采取行动的情况下所增加的生命周期。结果明确表明,由于未能共享专有的url提要,大量资金正处于风险之中。我们分析了阻止拦截公司共享数据的动机,并将其与反病毒行业(共享盛行)以及购买漏洞信息(攻击信息保密)的计划进行了对比。最后,我们建议网络钓鱼攻击的防御者开始相互合作共享有关网络钓鱼url的所有数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The consequence of non-cooperation in the fight against phishing Lessons from a real world evaluation of anti-phishing training Internet Situation Awareness Practice & prevention of home-router mid-stream injection attacks A distributed architecture for phishing detection using Bayesian Additive Regression Trees
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1