Homoglyph Attack Detection with Unpaired Data

被引:0
|
作者
Lu, Yiwei [1 ]
Kumar, Mahesh K. [1 ]
Mohammed, Noman [1 ]
Wang, Yang [1 ]
机构
[1] Univ Manitoba, Winnipeg, MB, Canada
来源
SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Homoglyph Attack; Neural Network; Cyber Security;
D O I
10.1145/3318216.3363337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The human eyes fall prey to cyber-attacks designed to visually deceive us. One such attack that has been effective is named spoofing or homoglyph attack. A homoglyph attack employs a simple trick to deceive us by using a spoof domain or process (file) name that is hard to distinguish from the legitimate names. Due to this, a user might be drawn to click on the spoof process or domain names, and in worst-case it results in triggering any malicious malware planted in them. As a result, their sensitive personal information might be at risk of being exposed. To address the problem mentioned above, existing works use simple approaches related to string comparison techniques that are extensively applied to compare genomes. Although they are effective, these methods are computationally expensive and suffer from low precision due to high false positive predictions. In recent years, machine learning has been applied to a variety of problems, and similar efforts have been made to address homoglyph attacks with neural networks to improve the efficiency of preemptive cyber-attack detection. However, both of these approaches have a common constraint, which is related to the requirement of paired sequences to determine the difference between real vs. spoof strings. As a result, existing approaches are not practical to real-world scenarios when paired sequences are unavailable. In this paper, we introduce a new unpaired homoglyph attack detection system using a convolutional neural network. We formulate two unpaired datasets based on the original datasets reported in [36], which contain real and spoof names for both domains and processes. We train the model end-to-end in a supervised manner. Our experiments demonstrate the robustness of our model in terms of performance in detecting homoglyph attacks. Additionally, it is easy to integrate into any browser with a simple REST [28] API. We show that our model can reach state-of-the-art in detecting homoglyph attack with 94% accuracy on the domain spoof dataset and 95% accuracy on process spoof dataset even without requiring paired data as input. We believe that this work is useful in realworld to appropriately safeguard sensitive information of the users from adversaries.
引用
收藏
页码:377 / 382
页数:6
相关论文
共 50 条
  • [21] Detection, differentiation and localization of replay attack and false data injection attack based on random matrix
    Yuehao Shen
    Zhijun Qin
    Scientific Reports, 14
  • [22] Attack Detection in Wireless Sensor Network: A Big Data Perspective
    Kulkarni, A. V.
    Mithra, V.
    Menon, Radhika
    CYBERNETICS AND SYSTEMS, 2024, 55 (08) : 2512 - 2539
  • [23] Analysing the Influence of the DCBF data Structure on the DoS Attack Detection
    Dodig, Ivica
    Cafuta, Davor
    Sruk, Vlado
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 791 - 797
  • [24] Research of Data mining in Intrusion Detection System and the uncertainty of the attack
    Liu, Wei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1305 - 1308
  • [25] Data augmentation and post selection for improved replay attack detection
    Zhao, Yuanjun
    Togneri, Roberto
    Sreeram, Victor
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 818 - 821
  • [26] Boosting False Data Injection Attack Detection with Structural Knowledge
    Huang, Qiushi
    Wu, Chenye
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4595 - 4600
  • [27] DDoS Attack Detection and Mitigation at SDN Data Plane Layer
    Abdulkarem, Huda Saleh
    Dawod, Ammar
    2020 IEEE 2ND GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2020), 2020, : 322 - 326
  • [28] Detection, estimation, and compensation of false data injection attack for UAVs
    Gu, Yapei
    Yu, Xiang
    Guo, Kexin
    Qiao, Jianzhong
    Guo, Lei
    Information Sciences, 2021, 546 : 723 - 741
  • [29] Detection, estimation, and compensation of false data injection attack for UAVs
    Gu, Yapei
    Yu, Xiang
    Guo, Kexin
    Qiao, Jianzhong
    Guo, Lei
    INFORMATION SCIENCES, 2021, 546 : 723 - 741
  • [30] Federated IoT attack detection using decentralized edge data
    Regan, Christopher
    Nasajpour, Mohammad
    Parizi, Reza M.
    Pouriyeh, Seyedamin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    MACHINE LEARNING WITH APPLICATIONS, 2022, 8