An Anti-Phishing Kit Scheme for Secure Web Transactions

被引:2
|
作者
Orunsolu, A. A. [1 ]
Sodiya, A. S. [2 ]
机构
[1] Moshood Abiola Polytech, Dept Comp Sci, Ojere, Abeokuta South, Nigeria
[2] Fed Univ Agr, Dept Comp Sci, Abeokuta, Nigeria
关键词
Backdoor; Electronic Commerce; Malicious Site; Internet; Phishing Kit;
D O I
10.5220/0006074900150024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, an anti-phishing approach was proposed against phishing pages generated by phishing kits. The architecture consists of a Sorter Module (SM) and Signature Detection Module (SDM). The SM is used to separate pages with login attributes and obfuscated scripts from other pages within the system. These sorted pages are fed into the SDM, where the signature of the suspicious page is generated. In SDM, a two-tier classifier is employed to generate phishing label based on signature analysis. Experimental results of the approach indicated a detection accuracy of 100% on specific phishing kit-generated sites and 98% on general phishing/legitimate data. To determine the detection time of the approach, latency analysis of the system was performed. The results indicated a latency 0.3s and standard deviation of 0.367s for the various operations performed by the system during detection. Thus, the approach effectively detects phishing pages by using ` fingerprints' from phishing kits.
引用
收藏
页码:15 / 24
页数:10
相关论文
共 50 条
  • [41] Survey of Anti-phishing Tools with Detection Capabilities
    Zeydan, Hiba Zuhair
    Selamat, Ali
    Salleh, Mazleena
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 214 - 219
  • [42] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [43] Interface Design Elements for Anti-phishing Systems
    Chen, Yan
    Zahedi, Fatemeh
    Abbasi, Ahmed
    SERVICE-ORIENTED PERSPECTIVES IN DESIGN SCIENCE RESEARCH: 6TH INTERNATIONAL CONFERENCE, 2011, 6629 : 253 - 265
  • [44] Emergent Challenges and IPDS for Anti-Phishing Attack
    Li Bing
    Sun Ruifeng
    Fang Xin
    Luo Xue
    Chang Wei-hao
    2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
  • [45] Anti-Phishing Using Hadoop-Framework
    Gavahane, Mayura
    Sequeira, Derick
    Pandey, Abhishek
    Shetty, Anush
    2015 INTERNATIONAL CONFERENCE ON TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICTSD-2015), 2015,
  • [46] An Anti-Phishing Method based on Feature Analysis
    Rajab, Majed
    2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, : 133 - 139
  • [47] How Effective is Anti-Phishing Training for Children?
    Lastdrager, Elmer
    Gallardo, Ines Carvajal
    Hartel, Pieter
    Junger, Marianne
    PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), 2017, : 229 - 239
  • [48] An Anti-Phishing System Employing Diffused Information
    Chen, Teh-Chung
    Stepan, Torin
    Dick, Scott
    Miller, James
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [49] Phishing Webpage Detection for Secure Online Transactions
    Sathish, S.
    Thirunavukarasu, A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 86 - 90
  • [50] 2 Years in the anti-phishing group of a large company
    Gallo, Luigi
    Maiello, Alessandro
    Botta, Alessio
    Ventre, Giorgio
    COMPUTERS & SECURITY, 2021, 105