Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

Basic Computer Skills Windows & the Internet.
PhishZoo: Detecting Phishing Websites By Looking at Them
4. Internet Programming ENG224 INFORMATION TECHNOLOGY – Part I
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Starter for 10 Unit 6: Searching for your hobbies Transform IT SFT06_searching_hobbies.
Internet Phishing Not the kind of Fishing you are used to.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Detection of Internet Scam Using Logistic Regression
SIEVE—Search Images Effectively through Visual Elimination Ying Liu, Dengsheng Zhang and Guojun Lu Gippsland School of Info Tech,
Improving web image search results using query-relative classifiers Josip Krapacy Moray Allanyy Jakob Verbeeky Fr´ed´eric Jurieyy.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
1 New : Create your own message starting from scratch 2 New From Template: add professionally designed templates provided exclusively by Gorilla Contact.
Jarhead Analysis and Detection of Malicious Java Applets Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna University of California Annual Computer.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Presented By Jay Dani.  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine,
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
PhishNet: Predictive Blacklisting to Detect Phishing Attacks Pawan Prakash Manish Kumar Ramana Rao Kompella Minaxi Gupta Purdue University, Indiana University.
March 2007 | Prague 1 Technical University of Vienna Politecnico di Milano Engin Kirda Christopher Kruegel Angelo P.E. Rosiello AntiPhish: An Anti-Phishing.
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
John P., Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy University of California, Santa Cruz USENIX SECURITY SYMPOSIUM, August, 2010 John P.,
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
Reliability & Desirability of Data
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
$100 $200 $300 $400 $500 Types of websites Searching on the Internet History and misc Internet Misc Info.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
11 CANTINA: A Content- Based Approach to Detecting Phishing Web Sites Reporter: Gia-Nan Gao Advisor: Chin-Laung Lei 2010/6/7.
Anti-Phishing Approaches Lifeng Hu
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
JavaScript, Fourth Edition
11 A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval Reporter: 林佳宜 /10/17.
1 Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD) Speaker Po-Jiu Wang Institute of Information Science.
Phishing Webpage Detection Jau-Yuan Chen COMS E6125 WHIM March 24, 2009.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Chapter 8 Browsing and Searching the Web. 2Practical PC 5 th Edition Chapter 8 Getting Started In this Chapter, you will learn: − What is a Web page −
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Copyright © 2005 Knowbility, Inc. Accessible Web Design Techniques 1 Accessibility Testing ► Code Validators – XHTML & CSS ► Accessibility Validators –
Habitat For Humanity Website Presented by Team FIST.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Phishing & Pharming. 2 Oct to July 2005 APWG.
Web Page Design 1 Information Technology ClassAct SRS enabled. Web Page Design This presentation will explore: creating web pages structure, formatting.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Thực hiện: D3 GVLT: BROWERS. Browser Compatibility I Check the compatibility II Tools III.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
HTML HyperText Markup Language Victoria E. Kozlek.
1 Phinding Phish : Evaluating Anti- Phishing Tools Yue Zhang,Jason Hong (2007) Carnegie Mellon University.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
Microsoft Windows 7 - Illustrated Unit G: Exploring the Internet with Microsoft Internet Explorer.
Brett Stone-GrossBrett Stone-Gross, Christopher Kruegel, Kevin AlmerothChristopher KruegelKevin Almeroth University of California, Santa Barbara Andreas.
Basic Computer Skills Windows & the Internet vfu.bg/en/e-Learning/
+ CIW LESSON 4 Web Browsers. + Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
ISYM 540 Current Topics in Information System Management
Advanced Techniques for Automatic Web Filtering
Advanced Techniques for Automatic Web Filtering
Objectives To understand the about types of computer network
Teaching you NOT to fall for Phish
Creating a Website.
Presentation transcript:

Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.

OUTLINE Introduction Our Approach Experimental Evaluation Conclusion And something else

Introduction – Phishing

Introduction – Related Work level solution ◦ Filters and content-analysis Browser-integrated solution ◦ SpoofGuard SpoofGuard ◦ PwdHash ◦ AntiPhish  Keeps track of sensitive information ◦ DOMAntiPhish  Compared the DOMs of the pages

Introduction – Related Work(cont.) But the most popular and widely- deployed solutions are based on the use of blacklists. ◦ IE 7 browser ◦ Google Safe Browsing ◦ NetCraft tool bar ◦ eBay tool bar ◦..etc

Introduction – Why Phishing Works Why Phishing Works Proc. CHI (2006) Why Phishing Works Proc. CHI (2006) ◦ SMTP does not contain any authentication mechanisms. ◦ About two million users gave information to spoofed websites resulting in direct losses of $1.2 billion (2003) ◦ 23% users base their trust only on page content

Introduction – Why Phishing Works(cont.) APWG detected more than 25,000 unique phishing URLs in Dec “Do-it-yourself” phishing kits are being made available for download free of charge from the internet. More sophisticated phishing attacks. ◦ Application-level vulnerability Application-level vulnerability

Our Approach Base on browser plugin ◦ AntiPhish ◦ DOMAntiPhish Comparing the visual similarity

Our Approach – Signature Extraction Three features ◦ Text pieces  Content, color, size, font family, position ◦ Images embedded in the page  Src value, area, color, Haar compression, position ◦ Overall visual appearance of the page  Color and Haar compressionHaar compression Page signature: S(w) =

Our Approach – Signature comparison Similarity between textual contents:  d l (T, Tˆ): Levenshtein distance Similarity betwwen colors:  L 1 (C,Cˆ): 1-norm distance

Our Approach – Signature comparison Home banking Welcome! Copyright 2007 t 1 = t 2 = t 3 =

Our Approach – Signature comparison Your banking Welcome! T 1 = T 2 =

Our Approach – Signature comparison t 1 = T 1 =

Our Approach – Signature Similarity score s t : average the largest n elements of the S t Final similarity score: ◦ s = a t s t + a i s i + a o s o ◦ Threshold d  Two pages are similar if and only if s ≥ d

Experimental Evaluation Web page dissimilarity level ◦ Level 0: almost perfect visual match ◦ Level 1: some different element ◦ Level 2: noticeable differences Dataset ◦ 41 positive pairs (from PhishTank) ◦ 161 negative pairs (common web pages)

Experimental Evaluation(cont.) Training set ◦ 14 positive paris and 21 negative pairs  e k = 0, true positive or true negative |s - d|, otherwise ◦ s = a t s t + a i s i + a o s o  a t = 2.11, a i = 0.11, a o = 1.20  Threshold d = 0.956

Experimental Evaluation(cont.)

Figure 2: One of the two missed positive pairs

Experimental Evaluation(cont.) Environment ◦ Dual AMD Opteron 64, 8GB RAM, Linux OS Computation Time ◦ 3.8 sec for positive pairs ◦ A few milliseconds for negative pairs after optimization

Conclusion A comparison technique that eliminates the shortcomings of AntiPhish and DOMAntiPhish Can also be integrated into any other anti-phishing system that can provide a list of legitimate sites

And something else Visual similarity-based phishing detection without victim site information CICS '09. IEEECICS '09. IEEE Visual Similarity between Phished Sites Virtual screen of X window to display a web browser Use ImgSeek to find similar images