Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

BogusBiter: A transparent protection against phishing attacks

Published: 10 June 2010 Publication History

Abstract

Many anti-phishing mechanisms currently focus on helping users verify whether a Web site is genuine. However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect Internet users from revealing their credentials to phishing sites. In this paper, instead of preventing human users from “biting the bait,” we propose a new approach to protect against phishing attacks with “bogus bites.” We develop BogusBiter, a unique client-side anti-phishing tool, which transparently feeds a relatively large number of bogus credentials into a suspected phishing site. BogusBiter conceals a victim's real credential among bogus credentials, and moreover, it enables a legitimate Web site to identify stolen credentials in a timely manner. Leveraging the power of client-side automatic phishing detection techniques, BogusBiter is complementary to existing preventive anti-phishing approaches. We implemented BogusBiter as an extension to the Firefox 2 Web browser, and evaluated its efficacy through real experiments on both phishing and legitimate Web sites. Our experimental results indicate that it is promising to use BogusBiter to transparently protect against phishing attacks.

References

[1]
Adida, B. 2007. BeamAuth: Two-factor Web authentication with a bookmark. In Proceedings of the Conference on Computer and Communication Security (CCS). 48--57.
[2]
Ahn, L., Blum, M., Hopper, N., and Langford, J. 2003. CAPTCHA: Using hard AI problems for security. In Proceedings of Eurocrypt. 294--311.
[3]
APWG. 2008. Anti-Phishing Working Group (APWG). http://www.antiphishing.org/.
[4]
APWG-PSTC. 2008. APWG: Phishing Scams by Targeted Company. http://www.millersmiles.co.uk/scams.php.
[5]
Poettering, B. 2008. jssha256. http://point-at-infinity.org/jssha256/.
[6]
Birk, D., Dornseif, M., Gajek, S., and Gröbert, F. 2006. Phishing phishers—tracing identity thieves and money launderer. Tech. rep. Horst-Görtz Institute of Ruhr-University of Bochum.
[7]
Bortz, A., Boneh, D., and Nandy, P. 2007. Exposing private information by timing Web applications. In Proceedings of the International World Wide web Conference (WWW). 621--628.
[8]
Chiasson, S., van Oorschot, P. C., and Biddle, R. 2006. A usability study and critique of two password managers. In Proceedings of the USENIX Security Symposium. 1--16.
[9]
Chou, N., Ledesma, R., Teraguchi, Y., and Mitchell, J. C. 2004. Client-side defense against web-based identity theft. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[10]
Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic security skins. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 77--88.
[11]
Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). 581--590.
[12]
Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 79--90.
[13]
EBankingSecurity. 2008. eBanking Security. http://www.ebankingsecurity.com/ebanking_bad_for_your_bank_balance.pdf.
[14]
Egelman, S., Cranor, L. F., and Hong, J. 2008. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). 1065--1074.
[15]
Felten, E. W., Balfanz, D., Dean, D., and Wallach, D. S. 1997. Web Spoofing: An Internet Con Game. In Proceedings of the 20th National Information Systems Security Conference.
[16]
Fette, I., Sadeh, N., and Tomasic, A. 2007. Learning to detect phishing emails. In Proceedings of the International World Wide Web Conference (WWW). 649--656.
[17]
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. 1999. RFC 2616, Hypertext Transfer Protocol -- HTTP/1.1.
[18]
FirefoxPhishingProtection. 2008. Firefox Phishing Protection. http://www.mozilla.com/en-US/firefox/phishing-protection/.
[19]
FirefoxPhishingTest. 2006. Firefox 2 Phishing Protection Effectiveness Testing. http://www.mozilla.org/security/phishing-test.html.
[20]
Florêncio, D. and Herley, C. 2006. Password rescue: A new approach to phishing prevention. In Proceedings of the USENIX Workshop on Hot Topics in Security (HOTSEC).
[21]
Florêncio, D. and Herley, C. 2007. A large-scale study of Web password habits. In Proceedings of the International World Wide Web Conference (WWW). 657--666.
[22]
Florêncio, D., Herley, C., and Coskun, B. 2007. Do strong web passwords accomplish anything? In Proceedings of the USENIX Workshop on Hot Topics in Security (HOTSEC).
[23]
FSTC-Phishing. 2005. Understanding and countering the phishing threat. The Financial Services Technology Consortium (FSTC) Project White Paper, http://fstc.org/projects/counter_phishing_phase_1/.
[24]
Garera, S., Provos, N., Chew, M., and Rubin, A. D. 2007. A framework for detection and measurement of phishing attacks. In Proceedings of the ACM Workshop On Recuring Malcode (WORM).
[25]
GartnerSurvey. 2006. Gartner, inc.,. http://www.gartner.com/it/page.jsp?id=498245.
[26]
Halderman, J. A., Waters, B., and Felten, E. W. 2005. A convenient method for securely managing passwords. In Proceedings of the International World Wide Web Conference (WWW). 471--479.
[27]
IBM-FairUCE. 2005. IBM set to use spam to attack spammer. http://money.cnn.com/2005/03/22/technology/ibm_spam/index.htm.
[28]
InaccessibilityCAPTCHA. 2008. Inaccessibility of CAPTCHA. http://www.w3.org/TR/turingtest/.
[29]
Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. 2007. Social phishing. Comm. ACM 50, 10, 94--100.
[30]
Jakobsson, M. and Myers, S. 2006. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience.
[31]
Jakobsson, M. and Ratkiewicz, J. 2006. Designing ethical phishing experiments: A study of (ROT13) rOnl query features. In Proceedings of the International World Wide Web Conference (WWW). 513--522.
[32]
Jakobsson, M. and Young, A. 2005. Distributed phishing attacks. In Proceedings of the Workshop on Resilient Financial Information Systems.
[33]
Kandula, S., Katabi, D., Jacob, M., and Berger, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI). 287--300.
[34]
Kirda, E. and Kruegel, C. 2005. Protecting users against phishing attacks with AntiPhish. In Proceedings of the Annual International Computer Software and Applications Conference (COMPSAC). 517--524.
[35]
Klein, D. V. 1990. Foiling the cracker—A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Workshop on Security. 5--14.
[36]
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., and Nung, E. 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). 905--914.
[37]
KYE-Phishing. 2008. Know Your Enemy: Phishing. http://www.honeynet.org/papers/phishing/.
[38]
Ludl, C., McAllister, S., Kirda, E., and Kruegel, C. 2007. On the effectiveness of techniques to detect phishing sites. In Proceedings of the International Conference on Detection of Instructions and Malware & Vulnerability Assessment (DIMVA).
[39]
MarkMonitor. 2008. MarkMonitor: Internet Fraud Prevention and Brand Protection. http://www.markmonitor.com/.
[40]
MicrosoftPhishingFilter. 2008. Microsoft Phishing Filter. http://www.microsoft.com/protect/products/yourself/.
[41]
Monrose, F., Reiter, M. K., and Wetzel, S. 1999. Password hardening based on keystroke dynamics. In Proceedings of the Conference on Computer and Communication Security (CCS). 73--82.
[42]
Moore, T. and Clayton, R. 2007. Examining the impact of website take-down on phishing. In Proceedings of the APWG eCrime Researchers Summit.
[43]
Morris, R. and Thompson, K. 1979. Password security: A case history. Comm. ACM 22, 11, 594--597.
[44]
Moshchuk, A., Bragin, T., Deville, D., Gribble, S. D., and Levy, H. M. 2007. Spyproxy: Execution-based detection of malicious web content. In Proceedings of the USENIX Security Symposium. 27--42.
[45]
Parno, B., Kuo, C., and Perrig, A. 2006. Phoolproof phishing prevention. In Proceedings of the Financial Cryptography. 1--19.
[46]
PhishTank. 2008. PhishTank. http://www.phishtank.com/.
[47]
Pinkas, B. and Sander, T. 2002. Securing passwords against dictionary attacks. In Proceedings of the Conference on Computer and Communication Security (CCS). 161--170.
[48]
Reis, C., Dunagan, J., Wang, H. J., Dubrovsky, O., and Esmeir, S. 2006. Browsershield: Vulnerability-driven filtering of dynamic html. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 61--74.
[49]
Robichaux, P. and Ganger, D. L. 2006. Gone phishing: Evaluating anti-phishing tools for Windows. http://www.3sharp.com/projects/antiphishing/gone-phishing.pdf.
[50]
Ross, B., Jackson, C., Miyake, N., Boneh, D., and Mitchell, J. C. 2005. Stronger password authentication using browser extensions. In Proceedings of the USENIX Security Symposium. 17--32.
[51]
RSA. 2008. Home - RSA, The Security Division of EMC. http://www.rsa.com/.
[52]
Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. 2007. The emperor's new security indicators: An evaluation of Website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy. 51--65.
[53]
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L. F., Hong, J., and Nunge, E. 2007. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 88--99.
[54]
Tcpmon. 2008. tcpmon: An open-source utility to Monitor A TCP Connection. https://tcpmon.dev.java.net/.
[55]
VirtualKeyboard. 2007. Hacker demos how to defeat Citibanks virtual keyboard. http://blogs.zdnet.com/security/?p=195.
[56]
Whalen, T. and Inkpen, K. M. 2005. Gathering evidence: use of visual security cues in web browsers. In Proceedings of the Conference on Graphics Interface. 137--144.
[57]
Wu, M. 2006. Fighting Phishing at the User Interface. Ph.D. thesis, MIT.
[58]
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006a. Do security toolbars actually prevent phishing attacks? In Proceedings of the Conference on Human Factors in Computing Systems (CHI). 601--610.
[59]
Wu, M., Miller, R. C., and Little, G. 2006b. Web Wallet: Preventing phishing attacks by revealing user intentions. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 102--113.
[60]
Wu, T. 1998. The secure remote password protocol. In Proceedings of the Network and Distributed System. Security Symposium (NDSS).
[61]
XMLHttpRequest. 2008. http://www.w3.org/TR/XMLHttpRequest/.
[62]
Ye, Z. E. and Smith, S. 2002. Trusted paths for browsers. In Proceedings of the USENIX Security Symposium. 263--279.
[63]
Yee, K.-P. and Sitaker, K. 2006. Passpet: Convenient password management and phishing protection. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 32--43.
[64]
Yue, C. and Wang, H. 2008. Anti-phishing in offense and defense. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). 345--354.
[65]
Zhang, Y., Egelman, S., Cranor, L. F., and Hong, J. 2007a. Phinding phish: Evaluating anti-phishing tools. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[66]
Zhang, Y., Hong, J., and Cranor, L. 2007b. CANTINA: A content-based approach to detecting phishing web sites. In Proceedings of the International World Wide Web Conference (WWW). 639--648.

Cited By

View all
  • (2024)Anti-phishing Attacks in GamificationEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_383(117-122)Online publication date: 5-Jan-2024
  • (2023)PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine LearningIEEE Access10.1109/ACCESS.2023.328722611(61249-61263)Online publication date: 2023
  • (2022)A lightweight and proactive rule-based incremental construction approach to detect phishing scamInformation Technology and Management10.1007/s10799-021-00351-723:4(271-298)Online publication date: 17-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 10, Issue 2
May 2010
123 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/1754393
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 June 2010
Accepted: 01 November 2009
Revised: 01 October 2009
Received: 01 January 2009
Published in TOIT Volume 10, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Phishing
  2. credential theft
  3. security
  4. usability
  5. web spoofing

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)39
  • Downloads (Last 6 weeks)7
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Anti-phishing Attacks in GamificationEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_383(117-122)Online publication date: 5-Jan-2024
  • (2023)PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine LearningIEEE Access10.1109/ACCESS.2023.328722611(61249-61263)Online publication date: 2023
  • (2022)A lightweight and proactive rule-based incremental construction approach to detect phishing scamInformation Technology and Management10.1007/s10799-021-00351-723:4(271-298)Online publication date: 17-Jan-2022
  • (2022)Using Amnesia to Detect Credential Database BreachesCyber Deception10.1007/978-3-031-16613-6_9(183-215)Online publication date: 7-Oct-2022
  • (2022)An Approach to Generate Realistic HTTP Parameters for Application Layer DeceptionApplied Cryptography and Network Security10.1007/978-3-031-09234-3_17(337-355)Online publication date: 20-Jun-2022
  • (2021)An Emerging Solution for Detection of Phishing AttacksCybersecurity Threats with New Perspectives [Working Title]10.5772/intechopen.96134Online publication date: 3-Mar-2021
  • (2021)SpoofCatch: A Client-Side Protection Tool Against Phishing AttacksIT Professional10.1109/MITP.2020.300647723:2(65-74)Online publication date: 1-Mar-2021
  • (2021)Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00222(1657-1662)Online publication date: Sep-2021
  • (2021)Online Social Network Security: A Comparative Review Using Machine Learning and Deep LearningNeural Processing Letters10.1007/s11063-020-10416-353:1(843-861)Online publication date: 1-Feb-2021
  • (2021)Anti-Phishing Attacks in GamificationEncyclopedia of Computer Graphics and Games10.1007/978-3-319-08234-9_383-1(1-7)Online publication date: 23-Sep-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media