首页 > 最新文献

2008 eCrime Researchers Summit最新文献

英文 中文
Evolutionary study of phishing 网络钓鱼的进化研究
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696967
Danesh Irani, Steve Webb, Jonathon T. Giffin, C. Pu
We study the evolution of phishing email messages in a corpus of over 380,000 phishing messages collected from August 2006 to December 2007. Our first result is a classification of phishing messages into two groups: flash attacks and non-flash attacks. Phishing message producers try to extend the usefulness of a phishing message by reusing the same message. In some cases this is done by sending a large volume of phishing messages over a short period of time (flash-attack) versus the same phishing message spread over a relatively longer period (nonflash attacks). Our second result is a corresponding classification of phishing features into two groups: transitory features and pervasive features. Features which are present in a few attacks and have a relatively short life span (transitory) are generally strong indicators of phishing, whereas features which are present in most of the attacks and have a long life span (pervasive) are generally weak selectors of phishing. One explanation of this is that phishing message producers limit the utility of transitory features in time (by avoiding them in future generations of phishing) and limit the utility of pervasive features by choosing features that also appear in legitimate messages. While useful in improving the understanding of phishing messages, our results also show the need for further study.
我们研究了从2006年8月到2007年12月收集的超过38万条网络钓鱼邮件的语料库中网络钓鱼邮件的演变。我们的第一个结果是将网络钓鱼信息分为两组:flash攻击和非flash攻击。网络钓鱼消息生产者试图通过重用相同的消息来扩展网络钓鱼消息的有用性。在某些情况下,这是通过在短时间内发送大量的网络钓鱼消息(flash攻击),而不是在相对较长的时间内发送相同的网络钓鱼消息(非flash攻击)来实现的。我们的第二个结果是将网络钓鱼特征分为两组:短暂特征和普遍特征。在少数攻击中出现且生命周期相对较短(短暂)的特征通常是网络钓鱼的强指标,而在大多数攻击中出现且生命周期较长(普遍)的特征通常是网络钓鱼的弱选择。对此的一种解释是,网络钓鱼消息生产者在时间上限制了临时功能的效用(通过在未来几代的网络钓鱼中避免它们),并通过选择也出现在合法消息中的功能来限制普遍功能的效用。虽然有助于提高对网络钓鱼信息的理解,但我们的结果也表明需要进一步研究。
{"title":"Evolutionary study of phishing","authors":"Danesh Irani, Steve Webb, Jonathon T. Giffin, C. Pu","doi":"10.1109/ECRIME.2008.4696967","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696967","url":null,"abstract":"We study the evolution of phishing email messages in a corpus of over 380,000 phishing messages collected from August 2006 to December 2007. Our first result is a classification of phishing messages into two groups: flash attacks and non-flash attacks. Phishing message producers try to extend the usefulness of a phishing message by reusing the same message. In some cases this is done by sending a large volume of phishing messages over a short period of time (flash-attack) versus the same phishing message spread over a relatively longer period (nonflash attacks). Our second result is a corresponding classification of phishing features into two groups: transitory features and pervasive features. Features which are present in a few attacks and have a relatively short life span (transitory) are generally strong indicators of phishing, whereas features which are present in most of the attacks and have a long life span (pervasive) are generally weak selectors of phishing. One explanation of this is that phishing message producers limit the utility of transitory features in time (by avoiding them in future generations of phishing) and limit the utility of pervasive features by choosing features that also appear in legitimate messages. While useful in improving the understanding of phishing messages, our results also show the need for further study.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133563380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
The consequence of non-cooperation in the fight against phishing 不合作打击网络钓鱼的后果
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696968
T. Moore, R. Clayton
A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the Websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry - where sharing prevails - and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.
银行减轻网络钓鱼影响的一个关键方法是删除欺诈性网站或暂停使用滥用域名。这种数据攻击通常被转包给专业公司。我们分析了六个月来来自多个来源的钓鱼网站url的数据,其中包括两家这样的公司。我们证明,在每种情况下,其他人可能知道大量的网站,但拥有删除合同的公司仍然不知道它们,或者只是很晚才知道它们的存在。我们监控了所有网站,以确定它们何时被删除,并计算删除公司在不知道他们应该采取行动的情况下所增加的生命周期。结果明确表明,由于未能共享专有的url提要,大量资金正处于风险之中。我们分析了阻止拦截公司共享数据的动机,并将其与反病毒行业(共享盛行)以及购买漏洞信息(攻击信息保密)的计划进行了对比。最后,我们建议网络钓鱼攻击的防御者开始相互合作共享有关网络钓鱼url的所有数据。
{"title":"The consequence of non-cooperation in the fight against phishing","authors":"T. Moore, R. Clayton","doi":"10.1109/ECRIME.2008.4696968","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696968","url":null,"abstract":"A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the Websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry - where sharing prevails - and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114354740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
A distributed architecture for phishing detection using Bayesian Additive Regression Trees 使用贝叶斯加性回归树的分布式网络钓鱼检测架构
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696965
Saeed Abu-Nimeh, D. Nappa, Xinlei Wang, S. Nair
With the variety of applications in mobile devices, such devices are no longer deemed calling gadgets merely. Various applications are used to browse the Internet, thus access financial data, and store sensitive personal information. In consequence, mobile devices are exposed to several types of attacks. Specifically, phishing attacks can easily take advantage of the limited or lack of security and defense applications therein. Furthermore, the limited power, storage, and processing capabilities render machine learning techniques inapt to classify phishing and spam emails in such devices. The present study proposes a distributed architecture hinging on machine learning approaches to detect phishing emails in a mobile environment based on a modified version of Bayesian additive regression trees (BART). Apparently, BART suffers from high computational time and memory overhead, therefore, distributed algorithms are proposed to accommodate detection applications in resource constrained wireless environments.
随着移动设备应用的多样化,这些设备不再仅仅被认为是打电话的小工具。各种各样的应用程序被用来浏览互联网,从而访问金融数据,并存储敏感的个人信息。因此,移动设备暴露在几种类型的攻击之下。具体来说,网络钓鱼攻击可以很容易地利用其中有限或缺乏安全性和防御的应用程序。此外,有限的功率、存储和处理能力使得机器学习技术无法对此类设备中的网络钓鱼和垃圾邮件进行分类。本研究提出了一种基于机器学习方法的分布式架构,以基于修改版本的贝叶斯加性回归树(BART)来检测移动环境中的网络钓鱼电子邮件。显然,BART具有较高的计算时间和内存开销,因此,提出了分布式算法来适应资源受限的无线环境中的检测应用。
{"title":"A distributed architecture for phishing detection using Bayesian Additive Regression Trees","authors":"Saeed Abu-Nimeh, D. Nappa, Xinlei Wang, S. Nair","doi":"10.1109/ECRIME.2008.4696965","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696965","url":null,"abstract":"With the variety of applications in mobile devices, such devices are no longer deemed calling gadgets merely. Various applications are used to browse the Internet, thus access financial data, and store sensitive personal information. In consequence, mobile devices are exposed to several types of attacks. Specifically, phishing attacks can easily take advantage of the limited or lack of security and defense applications therein. Furthermore, the limited power, storage, and processing capabilities render machine learning techniques inapt to classify phishing and spam emails in such devices. The present study proposes a distributed architecture hinging on machine learning approaches to detect phishing emails in a mobile environment based on a modified version of Bayesian additive regression trees (BART). Apparently, BART suffers from high computational time and memory overhead, therefore, distributed algorithms are proposed to accommodate detection applications in resource constrained wireless environments.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131877286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lessons from a real world evaluation of anti-phishing training 反钓鱼培训的真实评估经验教训
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696970
P. Kumaraguru, Steve Sheng, A. Acquisti, L. Cranor, Jason I. Hong
Prior laboratory studies have shown that PhishGuru, an embedded training system, is an effective way to teach users to identify phishing scams. PhishGuru users are sent simulated phishing attacks and trained after they fall for the attacks. In this current study, we extend the PhishGuru methodology to train users about spear phishing and test it in a real world setting with employees of a Portuguese company. Our results demonstrate that the findings of PhishGuru laboratory studies do indeed hold up in a real world deployment. Specifically, the results from the field study showed that a large percentage of people who clicked on links in simulated emails proceeded to give some form of personal information to fake phishing websites, and that participants who received PhishGuru training were significantly less likely to fall for subsequent simulated phishing attacks one week later. This paper also presents some additional new findings. First, people trained with spear phishing training material did not make better decisions in identifying spear phishing emails compared to people trained with generic training material. Second, we observed that PhishGuru training could be effective in training other people in the organization who did not receive training messages directly from the system. Third, we also observed that employees in technical jobs were not different from employees with non-technical jobs in identifying phishing emails before and after the training. We conclude with some lessons that we learned in conducting the real world study.
先前的实验室研究表明,PhishGuru,一个嵌入式培训系统,是教用户识别网络钓鱼骗局的有效方法。PhishGuru的用户会收到模拟的网络钓鱼攻击,并在他们被攻击后接受培训。在当前的研究中,我们扩展了PhishGuru方法来培训用户关于鱼叉式网络钓鱼,并在现实世界中与一家葡萄牙公司的员工进行了测试。我们的研究结果表明,PhishGuru实验室研究的发现在现实世界的部署中确实站得住脚跟。具体来说,实地研究的结果表明,点击模拟电子邮件链接的人中有很大一部分人继续向虚假的网络钓鱼网站提供某种形式的个人信息,并且接受过PhishGuru培训的参与者在一周后遭受后续模拟网络钓鱼攻击的可能性大大降低。本文还提出了一些新的发现。首先,接受过鱼叉式网络钓鱼培训材料的人在识别鱼叉式网络钓鱼邮件方面,与接受过普通培训材料的人相比,并没有做出更好的决定。其次,我们观察到PhishGuru培训可以有效地培训组织中没有直接从系统接收培训信息的其他人。第三,我们还观察到,在培训前后,技术岗位的员工与非技术岗位的员工在识别网络钓鱼邮件方面没有差异。最后,我们总结了一些我们在进行现实世界的研究中学到的经验教训。
{"title":"Lessons from a real world evaluation of anti-phishing training","authors":"P. Kumaraguru, Steve Sheng, A. Acquisti, L. Cranor, Jason I. Hong","doi":"10.1109/ECRIME.2008.4696970","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696970","url":null,"abstract":"Prior laboratory studies have shown that PhishGuru, an embedded training system, is an effective way to teach users to identify phishing scams. PhishGuru users are sent simulated phishing attacks and trained after they fall for the attacks. In this current study, we extend the PhishGuru methodology to train users about spear phishing and test it in a real world setting with employees of a Portuguese company. Our results demonstrate that the findings of PhishGuru laboratory studies do indeed hold up in a real world deployment. Specifically, the results from the field study showed that a large percentage of people who clicked on links in simulated emails proceeded to give some form of personal information to fake phishing websites, and that participants who received PhishGuru training were significantly less likely to fall for subsequent simulated phishing attacks one week later. This paper also presents some additional new findings. First, people trained with spear phishing training material did not make better decisions in identifying spear phishing emails compared to people trained with generic training material. Second, we observed that PhishGuru training could be effective in training other people in the organization who did not receive training messages directly from the system. Third, we also observed that employees in technical jobs were not different from employees with non-technical jobs in identifying phishing emails before and after the training. We conclude with some lessons that we learned in conducting the real world study.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117151386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Internet Situation Awareness 互联网态势感知
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696966
Malte Hesse, N. Pohlmann
The Internet is consisting of autonomous systems each managed by individual and rival organizations, which makes it very difficult to capture as a whole. Internet situation awareness can be accomplished by creating a common basis for private and public operators to monitor their networks. Thus, an overlay monitoring layer is needed, which can be utilized to address a very important aspect for a more secure and trustworthy Internet. This is the need of various stakeholders to have the information they need to perform their decision tasks in a reliable fashion. This can be accomplished by offering them a common smart approach and the additional benefit of a global view, which they can use to compare their local situation with. This smart approach should utilize well proven existing global statistics, best practices and existing technical sensors, which can be adapted to the overall common framework. From this, output for all relevant stakeholders, like national assessments centers, can be generated to fulfill the individual needs. One possible input source could be the technical sensor technology, which has been developed by our Institute for Internet security and which we give to partners and other researchers free of charge. It is a great basis for an Internet situation awareness, since it is a well proven system, which has been in operation for a couple of years, and since it can easily be adapted by our developers to comply with the overall framework. The great advantages are in addition (i) that it is privacy compliant by design and (ii) can offer high performance with the (iii) capability for long time storage of the collected raw data. Using raw data collected at various positions of the Internet infrastructure, we aim to generate a continuous global view of the current state of the Internet, which can be utilized as input for the Internet situation awareness.
互联网由自治系统组成,每个系统由个人和竞争组织管理,这使得很难将其作为一个整体进行捕获。互联网态势感知可以通过为私营和公共运营商创建一个共同的基础来监控他们的网络来实现。因此,需要一个覆盖监控层,它可以用来解决一个更安全、更值得信赖的互联网的一个非常重要的方面。这是各种涉众的需求,他们需要以可靠的方式获得执行决策任务所需的信息。这可以通过为他们提供一个通用的智能方法和全局视图的额外好处来实现,他们可以使用全局视图来比较他们的本地情况。这一明智的做法应利用经过充分验证的现有全球统计数据、最佳做法和现有技术传感器,使之适应总体共同框架。由此,可以为所有相关利益攸关方(如国家评估中心)产生产出,以满足个人需求。一个可能的输入来源是技术传感器技术,这是由我们的互联网安全研究所开发的,我们将免费提供给合作伙伴和其他研究人员。它是Internet态势感知的一个很好的基础,因为它是一个经过良好验证的系统,已经运行了几年,而且我们的开发人员可以很容易地对它进行调整,以符合整个框架。此外,最大的优点是(i)它在设计上符合隐私,(ii)可以提供高性能,(iii)可以长时间存储收集的原始数据。利用在互联网基础设施的不同位置收集的原始数据,我们的目标是生成互联网当前状态的连续全球视图,这些视图可以用作互联网态势感知的输入。
{"title":"Internet Situation Awareness","authors":"Malte Hesse, N. Pohlmann","doi":"10.1109/ECRIME.2008.4696966","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696966","url":null,"abstract":"The Internet is consisting of autonomous systems each managed by individual and rival organizations, which makes it very difficult to capture as a whole. Internet situation awareness can be accomplished by creating a common basis for private and public operators to monitor their networks. Thus, an overlay monitoring layer is needed, which can be utilized to address a very important aspect for a more secure and trustworthy Internet. This is the need of various stakeholders to have the information they need to perform their decision tasks in a reliable fashion. This can be accomplished by offering them a common smart approach and the additional benefit of a global view, which they can use to compare their local situation with. This smart approach should utilize well proven existing global statistics, best practices and existing technical sensors, which can be adapted to the overall common framework. From this, output for all relevant stakeholders, like national assessments centers, can be generated to fulfill the individual needs. One possible input source could be the technical sensor technology, which has been developed by our Institute for Internet security and which we give to partners and other researchers free of charge. It is a great basis for an Internet situation awareness, since it is a well proven system, which has been in operation for a couple of years, and since it can easily be adapted by our developers to comply with the overall framework. The great advantages are in addition (i) that it is privacy compliant by design and (ii) can offer high performance with the (iii) capability for long time storage of the collected raw data. Using raw data collected at various positions of the Internet infrastructure, we aim to generate a continuous global view of the current state of the Internet, which can be utilized as input for the Internet situation awareness.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Practice & prevention of home-router mid-stream injection attacks 家庭路由器中流注入攻击的实践与防范
Pub Date : 2008-12-08 DOI: 10.1109/ECRIME.2008.4696969
Steven Myers, Sid Stamm
The vulnerability of home routers has been widely discussed, but there has been significant skepticism in many quarters about the viability of using them to perform damaging attacks. Others have argued that traditional malware prevention technologies will function for routers. In this paper we show how easily and effectively a home router can be repurposed to perform a mid-stream script injection attack. This attack transparently and indiscriminately siphons off many cases of user entered form-data from arbitrary (non-encrypted) Web-sites, including usernames and passwords. Additionally, the attack can take place over a long period of time affecting the user at a large number of sites allowing a userpsilas information to be easily correlated by one attacker. The script injection attack is performed through malware placed on an insecure home router, between the client and server. We implemented the attack on a commonly deployed home router to demonstrate its realizability and potential. Next, we propose and implement efficient countermeasures to discourage or prevent both our attack and other Web targeted script injection attacks. The countermeasures are a form of short-term tamper-prevention based on obfuscation and cryptographic hashing. It takes advantage of the fact that Web scripts are both delivered and interpreted on demand. Rather than preventing the possibility of attack altogether, they simply raise the cost of the attack to make it non-profitable thus removing the incentive to attack in the first place. These countermeasures are robust and practically deployable: they permit caching, are deployed server-side, but push most of the computational effort to the client. Further, the countermeasures do not require the modification of browsers or Internet standards. Further, they do not require cryptographic certificates or frequent expensive cryptographic operations, a stumbling block for the proper deployment of SSL on many Web-servers run by small to medium-sized businesses.
家用路由器的漏洞已经被广泛讨论,但在许多方面,人们对使用它们进行破坏性攻击的可行性持严重怀疑态度。另一些人则认为,传统的恶意软件防护技术仍将适用于路由器。在本文中,我们展示了如何轻松有效地将家用路由器重新用于执行中流脚本注入攻击。这种攻击透明且不加区分地从任意(非加密)网站窃取用户输入的表单数据,包括用户名和密码。此外,攻击可以持续很长一段时间,影响大量站点上的用户,允许一个攻击者很容易地将用户信息关联起来。脚本注入攻击是通过放置在不安全的家庭路由器上的恶意软件在客户端和服务器之间执行的。我们在一个常用的家用路由器上实施了攻击,以证明其可实现性和潜力。接下来,我们提出并实现有效的对策来阻止或防止我们的攻击和其他Web目标脚本注入攻击。对策是一种基于混淆和加密散列的短期防篡改形式。它利用了Web脚本是按需交付和解释的这一事实。他们不是完全阻止攻击的可能性,而是简单地提高攻击的成本,使其无利可图,从而从一开始就消除了攻击的动机。这些对策是健壮的,并且实际上是可部署的:它们允许缓存,部署在服务器端,但将大部分计算工作推给了客户机。此外,这些对策不需要修改浏览器或互联网标准。此外,它们不需要加密证书或频繁的昂贵加密操作,这是在许多中小型企业运行的web服务器上正确部署SSL的绊脚石。
{"title":"Practice & prevention of home-router mid-stream injection attacks","authors":"Steven Myers, Sid Stamm","doi":"10.1109/ECRIME.2008.4696969","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696969","url":null,"abstract":"The vulnerability of home routers has been widely discussed, but there has been significant skepticism in many quarters about the viability of using them to perform damaging attacks. Others have argued that traditional malware prevention technologies will function for routers. In this paper we show how easily and effectively a home router can be repurposed to perform a mid-stream script injection attack. This attack transparently and indiscriminately siphons off many cases of user entered form-data from arbitrary (non-encrypted) Web-sites, including usernames and passwords. Additionally, the attack can take place over a long period of time affecting the user at a large number of sites allowing a userpsilas information to be easily correlated by one attacker. The script injection attack is performed through malware placed on an insecure home router, between the client and server. We implemented the attack on a commonly deployed home router to demonstrate its realizability and potential. Next, we propose and implement efficient countermeasures to discourage or prevent both our attack and other Web targeted script injection attacks. The countermeasures are a form of short-term tamper-prevention based on obfuscation and cryptographic hashing. It takes advantage of the fact that Web scripts are both delivered and interpreted on demand. Rather than preventing the possibility of attack altogether, they simply raise the cost of the attack to make it non-profitable thus removing the incentive to attack in the first place. These countermeasures are robust and practically deployable: they permit caching, are deployed server-side, but push most of the computational effort to the client. Further, the countermeasures do not require the modification of browsers or Internet standards. Further, they do not require cryptographic certificates or frequent expensive cryptographic operations, a stumbling block for the proper deployment of SSL on many Web-servers run by small to medium-sized businesses.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"80 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automating phishing website identification through deep MD5 matching 通过深度MD5匹配自动识别钓鱼网站
Pub Date : 2008-10-01 DOI: 10.1109/ECRIME.2008.4696972
Brad Wardman, Gary Warner
The timeliness of phishing incident response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through a method of comparing new URLs and their associated Web content with previously archived content of confirmed phishing sites. The results can be used to automate shutdown requests, to supplement traditional ldquoURL black listrdquo toolbars allowing blocking of previously unreported URLs, or to indicate dominant phishing site patterns which can be used to prioritize limited investigative resources.
由于需要人工验证可疑的url是否实际上是网络钓鱼站点,网络钓鱼事件响应的及时性受到了阻碍。本文提出了一种自动确定的方法,并通过将新url及其相关Web内容与先前已确认的网络钓鱼站点的存档内容进行比较,证明了该方法在减少需要人工审查的可疑url数量方面的有效性。结果可用于自动关闭请求,补充传统的ldquoURL黑名单工具栏,允许阻止以前未报告的url,或指示主要的网络钓鱼站点模式,可用于优先考虑有限的调查资源。
{"title":"Automating phishing website identification through deep MD5 matching","authors":"Brad Wardman, Gary Warner","doi":"10.1109/ECRIME.2008.4696972","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696972","url":null,"abstract":"The timeliness of phishing incident response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through a method of comparing new URLs and their associated Web content with previously archived content of confirmed phishing sites. The results can be used to automate shutdown requests, to supplement traditional ldquoURL black listrdquo toolbars allowing blocking of previously unreported URLs, or to indicate dominant phishing site patterns which can be used to prioritize limited investigative resources.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Legal risks for phishing researchers 网络钓鱼研究人员面临的法律风险
Pub Date : 2008-09-10 DOI: 10.1109/ECRIME.2008.4696971
Christopher Soghoian
Researchers are increasingly turning to live, dasiain the wildpsila phishing studies of users, who unknowingly participate without giving informed consent. Such studies can expose researchers to a number of unique, and fairly significant legal risks. This paper will present four case studies highlighting the steps that researchers have taken to avoid legal problems, and to highlight the legal risks that they were unable to avoid. It then provides a high-level introduction to a few particularly dangerous areas of American law. Finally, it concludes with a series of best practices that may help researchers to avoid legal trouble, however, this information should not be taken as legal advice.
研究人员越来越多地转向对用户进行网络钓鱼研究,这些用户在没有知情同意的情况下不知情地参与了研究。这样的研究可能会使研究人员面临许多独特的、相当重大的法律风险。本文将提出四个案例研究,突出了研究人员为避免法律问题所采取的步骤,并突出了他们无法避免的法律风险。然后对美国法律中几个特别危险的领域进行了高层次的介绍。最后,它总结了一系列可以帮助研究人员避免法律麻烦的最佳实践,然而,这些信息不应被视为法律建议。
{"title":"Legal risks for phishing researchers","authors":"Christopher Soghoian","doi":"10.1109/ECRIME.2008.4696971","DOIUrl":"https://doi.org/10.1109/ECRIME.2008.4696971","url":null,"abstract":"Researchers are increasingly turning to live, dasiain the wildpsila phishing studies of users, who unknowingly participate without giving informed consent. Such studies can expose researchers to a number of unique, and fairly significant legal risks. This paper will present four case studies highlighting the steps that researchers have taken to avoid legal problems, and to highlight the legal risks that they were unable to avoid. It then provides a high-level introduction to a few particularly dangerous areas of American law. Finally, it concludes with a series of best practices that may help researchers to avoid legal trouble, however, this information should not be taken as legal advice.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2008 eCrime Researchers Summit
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1