Title:
Fishing for Phishing from the Network Stream
Fishing for Phishing from the Network Stream
dc.contributor.author | Ramachandran, Anirudh | |
dc.contributor.author | Feamster, Nick | |
dc.contributor.author | Krishnamurthy, Balachander | |
dc.contributor.author | Spatscheck, Oliver | |
dc.contributor.author | Van der Merwe, Jacobus | |
dc.contributor.corporatename | Georgia Institute of Technology. College of Computing | |
dc.contributor.corporatename | Georgia Institute of Technology. School of Computer Science | |
dc.contributor.corporatename | AT&T Labs Research | |
dc.date.accessioned | 2008-11-07T19:03:40Z | |
dc.date.available | 2008-11-07T19:03:40Z | |
dc.date.issued | 2008 | |
dc.description.abstract | Phishing is an increasingly prevalent social-engineering attack that attempts identity theft using spoofed Web pages of legitimate organizations. Unfortunately, current phishing detection methods are neither complete nor responsive because they rely on user reports, and many also require clientside software. Anti-phishing techniques could be more effective if they (1) could detect phishing attacks automatically from the network traffic; (2) could operate without cooperation from end-users. This paper performs a preliminary study to determine the feasibility of detecting phishing attacks in real-time, from the network traffic stream itself. We develop a model to identify the stages where in-network phishing detection is feasible and the data sources that can be analyzed to provide relevant information at each stage. Based on this model, we develop and evaluate a detection method based on features that exist in the network traffic it- self and are correlated with confirmed phishing attacks. | en |
dc.identifier.uri | http://hdl.handle.net/1853/25463 | |
dc.language.iso | en_US | en |
dc.publisher | Georgia Institute of Technology | en |
dc.relation.ispartofseries | SCS Technical Report ; GT-CS-08-08 | en |
dc.subject | Blacklists | en |
dc.subject | Internet | en |
dc.subject | Network traffic | en |
dc.subject | Phishing | en |
dc.title | Fishing for Phishing from the Network Stream | en |
dc.type | Text | |
dc.type.genre | Technical Report | |
dspace.entity.type | Publication | |
local.contributor.corporatename | College of Computing | |
local.contributor.corporatename | School of Computer Science | |
local.relation.ispartofseries | College of Computing Technical Report Series | |
local.relation.ispartofseries | School of Computer Science Technical Report Series | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isOrgUnitOfPublication | 6b42174a-e0e1-40e3-a581-47bed0470a1e | |
relation.isSeriesOfPublication | 35c9e8fc-dd67-4201-b1d5-016381ef65b8 | |
relation.isSeriesOfPublication | 26e8e5bc-dc81-469c-bd15-88e6f98f741d |