Homoglyph Attack Detection with Unpaired Data

被引:0
|
作者
Lu, Yiwei [1 ]
Kumar, Mahesh K. [1 ]
Mohammed, Noman [1 ]
Wang, Yang [1 ]
机构
[1] Univ Manitoba, Winnipeg, MB, Canada
来源
SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Homoglyph Attack; Neural Network; Cyber Security;
D O I
10.1145/3318216.3363337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The human eyes fall prey to cyber-attacks designed to visually deceive us. One such attack that has been effective is named spoofing or homoglyph attack. A homoglyph attack employs a simple trick to deceive us by using a spoof domain or process (file) name that is hard to distinguish from the legitimate names. Due to this, a user might be drawn to click on the spoof process or domain names, and in worst-case it results in triggering any malicious malware planted in them. As a result, their sensitive personal information might be at risk of being exposed. To address the problem mentioned above, existing works use simple approaches related to string comparison techniques that are extensively applied to compare genomes. Although they are effective, these methods are computationally expensive and suffer from low precision due to high false positive predictions. In recent years, machine learning has been applied to a variety of problems, and similar efforts have been made to address homoglyph attacks with neural networks to improve the efficiency of preemptive cyber-attack detection. However, both of these approaches have a common constraint, which is related to the requirement of paired sequences to determine the difference between real vs. spoof strings. As a result, existing approaches are not practical to real-world scenarios when paired sequences are unavailable. In this paper, we introduce a new unpaired homoglyph attack detection system using a convolutional neural network. We formulate two unpaired datasets based on the original datasets reported in [36], which contain real and spoof names for both domains and processes. We train the model end-to-end in a supervised manner. Our experiments demonstrate the robustness of our model in terms of performance in detecting homoglyph attacks. Additionally, it is easy to integrate into any browser with a simple REST [28] API. We show that our model can reach state-of-the-art in detecting homoglyph attack with 94% accuracy on the domain spoof dataset and 95% accuracy on process spoof dataset even without requiring paired data as input. We believe that this work is useful in realworld to appropriately safeguard sensitive information of the users from adversaries.
引用
收藏
页码:377 / 382
页数:6
相关论文
共 50 条
  • [31] A novel strategy for locational detection of false data injection attack
    Mukherjee, Debottam
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 31
  • [32] Attack Detection and Mitigation using Intelligent Data Planes in SDNs
    Ganesan, Aparna
    Sarac, Kamil
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4161 - 4166
  • [33] False Data Injection Attack Detection in a Platoon of CACC in RSU
    Gao, Kai
    Cheng, Xiangyu
    Huang, Hao
    Li, Xunhao
    Yuan, Tingyu
    Du, Ronghua
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1324 - 1329
  • [34] Coordinated Data-Injection Attack and Detection in the Smart Grid
    Cui, Shuguang
    Han, Zhu
    Kar, Soummya
    Kim, Tung T.
    Poor, H. Vincent
    Tajer, Ali
    IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) : 106 - 115
  • [35] Causative label flip attack detection with data complexity measures
    Chan, Patrick P. K.
    He, Zhimin
    Hu, Xian
    Tsang, Eric C. C.
    Yeung, Daniel S.
    Ng, Wing W. Y.
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (01) : 103 - 116
  • [36] Malicious Insider Attack Detection in IoTs Using Data Analytics
    Khan, Ahmed Yar
    Latif, Rabia
    Latif, Seemab
    Tahir, Shahzaib
    Batool, Gohar
    Saba, Tanzila
    IEEE ACCESS, 2020, 8 (08): : 11743 - 11753
  • [37] Causative label flip attack detection with data complexity measures
    Patrick P. K. Chan
    Zhimin He
    Xian Hu
    Eric C. C. Tsang
    Daniel S. Yeung
    Wing W. Y. Ng
    International Journal of Machine Learning and Cybernetics, 2021, 12 : 103 - 116
  • [38] RC6 Based Data Security and Attack Detection
    Varshney, Nitin
    Raghuwanshi, Kavindra
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 3 - 10
  • [39] Learning MRI artefact removal with unpaired data
    Liu, Siyuan
    Thung, Kim-Han
    Qu, Liangqiong
    Lin, Weili
    Shen, Dinggang
    Yap, Pew-Thian
    NATURE MACHINE INTELLIGENCE, 2021, 3 (01) : 60 - 67
  • [40] Model parameter estimation with imprecise and unpaired data
    Sankararaman, Shankar
    Mahadevan, Sankaran
    INVERSE PROBLEMS IN SCIENCE AND ENGINEERING, 2012, 20 (07) : 1017 - 1041