skip to main content
10.1145/2030376.2030396acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

Identify fixed-path phishing attack by STC

Published:01 September 2011Publication History

ABSTRACT

Phishing websites gain billions of dollars of profits from stealing personal identities and private data. In this paper, an URL classification method is proposed to prioritize suspicious URLs in terms of phishing websites by examining the URL structures and performing string classification. Due to the fact that the average uptime of phishing sites is short, it is important for the proposed method to `timely react' to the newest phishing URLs while the URLs are still valid. Since the proposed method does not involve any web-crawling or content analysis, it can generate prioritized signatures from phishing URLs in a real-time fashion. Moreover, the proposed method consumes very little computing resources that, with an additional moderate PC, it can be injected into any existing real-time URL analysis system.

References

  1. Anti Phishing Working Group. Global Phishing Survry: Trends and Domain Name Use in 2H/2010. http://www.antiphishing.org/index.html. 2010Google ScholarGoogle Scholar
  2. Anti Phishing Working Group. Phishing Activity Trends Report, Q2/2010. http://www.antiphishing.org/reports/apwg_report_q2_2010.p df. 2010.Google ScholarGoogle Scholar
  3. Chen, X., Chandramouli, R. and Subbalakshmi, K. P. Scam Detection in Twitter. SIAM Text Mining Workshop, 2011.Google ScholarGoogle Scholar
  4. Farach, M. Optimal Suffix Tree Construction with Large Alphabets. FOCS: 137--143. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gartner, Inc. Gartner Says Number of Phishing Attacks on U. S. Consumers Increased 40 Percent in 2008. http://www.gartner.com/it/page.jsp?id=936913, 2009.Google ScholarGoogle Scholar
  6. S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair. A comparison of machine learning techniques for phishing detection. In Proceedings of the eCrime Researchers Summit, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Weiner, P. Linear pattern matching algorithms. In SWAT '73: Proceedings of the 14th Annual Symposium on Switching and Automata Theory (swat 1973), pages 1--11, Washington, DC, USA, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Whittaker, C., Ryner, B., and Nazzif, M. Large-scale automatic classification of phishing pages. In The 17th Annual Network and Distributed Security Symposium (NDSS), 2010.Google ScholarGoogle Scholar
  9. Wikipedia: Phishing. http://en.wikipedia.org/wiki/PhishingGoogle ScholarGoogle Scholar
  10. Zamir, O. and Etzioni, O. Web document clustering: A feasibility demonstration. In Proceedings of SIGIR'98, University of Washington, Seattle, USA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Identify fixed-path phishing attack by STC

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
            September 2011
            230 pages
            ISBN:9781450307888
            DOI:10.1145/2030376

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 September 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader