Fishing for phishes: applying capture-recapture methods to estimate phishing populations

R. Weaver, Michael Patrick Collins
{"title":"Fishing for phishes: applying capture-recapture methods to estimate phishing populations","authors":"R. Weaver, Michael Patrick Collins","doi":"10.1145/1299015.1299017","DOIUrl":null,"url":null,"abstract":"We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estimation technique originally developed for wildlife conservation, but is applicable in any environment wherein multiple independent parties collect reports of an activity.\n Generating a meaningful population estimate for phishing activity requires addressing complex relationships between phishers and phishing reports. Phishers clandestinely occupy machines and adding evasive measures into phishing URLs to evade firewalls and other fraud-detection measures. Phishing reports, in the meantime, may be demonstrate a preference towards certain classes of phish.\n We address these problems by estimating population in terms of netblocks and by clustering phishing attempts together into scams, which are phishes that demonstrate similar behavior on multiple axes. We generate population estimates using data from two different phishing reports over an 80-day period, and show that these reports capture approximately 40% of scams and 80% of CIDR/24 (256 contiguous address) netblocks involved in phishing.","PeriodicalId":130252,"journal":{"name":"APWG Symposium on Electronic Crime Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"APWG Symposium on Electronic Crime Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1299015.1299017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29

Abstract

We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estimation technique originally developed for wildlife conservation, but is applicable in any environment wherein multiple independent parties collect reports of an activity. Generating a meaningful population estimate for phishing activity requires addressing complex relationships between phishers and phishing reports. Phishers clandestinely occupy machines and adding evasive measures into phishing URLs to evade firewalls and other fraud-detection measures. Phishing reports, in the meantime, may be demonstrate a preference towards certain classes of phish. We address these problems by estimating population in terms of netblocks and by clustering phishing attempts together into scams, which are phishes that demonstrate similar behavior on multiple axes. We generate population estimates using data from two different phishing reports over an 80-day period, and show that these reports capture approximately 40% of scams and 80% of CIDR/24 (256 contiguous address) netblocks involved in phishing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
钓鱼:应用捕获-再捕获方法来估计钓鱼种群
我们通过对两个主要网络钓鱼网站报告的捕获-再捕获分析来估计互联网上网络钓鱼活动的范围。捕获-再捕获分析是一种种群估计技术,最初是为野生动物保护而开发的,但适用于任何环境,其中多个独立方收集活动报告。为网络钓鱼活动生成有意义的人口估计需要解决网络钓鱼者和网络钓鱼报告之间的复杂关系。钓鱼者秘密地占用机器,并在钓鱼url中添加规避措施,以逃避防火墙和其他欺诈检测措施。与此同时,网络钓鱼报告可能显示出对某些类型的网络钓鱼的偏好。我们通过估计网络块的数量和将网络钓鱼尝试聚类到诈骗中来解决这些问题,这些诈骗是在多个轴上表现出相似行为的网络钓鱼。我们使用来自两个不同的网络钓鱼报告的数据在80天内生成人口估计,并表明这些报告捕获了大约40%的诈骗和80%的CIDR/24(256个连续地址)网络块涉及网络钓鱼。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Fighting unicode-obfuscated spam Evaluating a trial deployment of password re-use for phishing prevention Behavioral response to phishing risk Fishing for phishes: applying capture-recapture methods to estimate phishing populations A comparison of machine learning techniques for phishing detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1