SlideShare a Scribd company logo
1 of 28
Department of Computer Science & Engg
College of Engineering,
Submitted by
Umme Ayesha
CONTENT
SL.NO TOPICS PAGE NO.
1 INTRODUCTION 1
2 OBJECTIVES 2
3 DEFINITIONS,MOTIVES,IMPORTANCE 3-7
5 MITIGATION OF PHISHING ATTACKS 8-12
6 DETECTION OF PHISHING ATTACKS 13-22
7 EVALUATIONOF PHISHING TECHNIQUES 23
8 CONCLUSION 24
9 REFERENCES 25
DEPT. OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
2014
INTRODUCTION
 PHISHING is a social engineering attack that aims at
exploiting the weakness found in system processes as
caused by system users.
 For eg. user leak their passwords if an attacker asked them
to update via http link.
 Due to the broad nature of the phishing problem, this
phishing detection survey was began.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
20141
OBJECTIVES
 Definitions
 Phishing Campaign
 Evaluation Metrics
 Detection
 Evaluation
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
2 2014
DEFINITIONS
 “Phishing is a fraudulent attempt, usually made through
email, to steal your personal information”
 “We define a phishing page as any web page that, without
permission, alleges to act on behalf of a third party with the
intention of confusing viewers into performing an action
with which the viewer would only trust a true agent of the
third party”
 Phishing is a type of computer attack that communicates
socially engineered messages to humans via electronic
communication channels in order to persuade them to
perform certain actions for the attacker’s benefit.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
3 2014
PHISHING MOTIVES
 The primary motives behind phishing attacks, from an
attacker’s perspective, are:
 Financial Gain: phishers can use stolen banking creden-
tials to their financial benefits.
 Identity Hiding: instead of using stolen identities directly,
phishers might sell the identities to others whom might be
criminals seeking ways to hide their identities and activities
 Fame and Notoriety: phishers might attack victims for the
sake of peer recognition.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
4 2014
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
5 2014
IMPORTANCE
 According to APWG, phishing attacks were in a raise till
August, 2009 40,621 unique phishing reports were
submitted to APWG.
 Drop in campaign due disappearence of Avanlanche gang.
(2010-11)
 Avalanche gang from traditional phishing campaigns into
malware-based phishing campaigns. (raise)
PHISHING DETECTION-A LITERATURE SURVEY
DEPT.OF COMPUTER SCIENCE 6 2014
PHISHING DETECTION-A LITERATURE SURVEY
DEPT.OF COMPUTER SCIENCE 7 2014
MITIGATION OF PHISHING
ATTACKS
Once the phishing attack is detected, a number of actions
could be applied against the campaign. The following
categories of approaches exist:
 Detection approaches
 Offensive Defence Approach
 Correction Approach
 Prevention Approach
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
8 2014
PHISHING DETECTION-A LITERATURE SURVEY
DEPT.OF COMPUTER SCIENCE 20149
(1) Detection Approaches
 User Training Approaches - end-users can be educated to
better understand the nature of phishing attacks, phishing
and non-phishing messages.
 Software classification approaches — these mitigation
approaches aim at classifying phishing and legitimate
messages on behalf of the user in an attempt to bridge the
gap that is left due to the human error or ignorance.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201410
(2) Offensive Defence Approach
 Offensive defence solutions aim to render phishing cam-
pains useless for the attackers by disrupting the phishing
campaigns.
 This is often achieved by flooding phishing web- sites with
fake credentials so that the attacker would have a difficult
time to find the real credentials.
 Example, BogusBiter : A browser toolbar that submits fake
information in HTML forms whenever a phishing website
is encountered.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201411
(3)Correction Approach
Correction is the act of taking the phishing resources down.
This is often achieved by reporting attacks to Service
Providers. Phishing campaigns often rely on resources,
such as:
 Websites
 E-mail messages
 Social Networking services
In order to correct such attempts
• Removal of phishing content from websites, or suspension
of hosting services.
• Suspension of email accounts, SMTP relays, VoIP ser vices.
• Trace back and shutdown of botnets.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201412
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
13 2014
(4)Prevention Approaches
The “prevention” of phishing attacks can be confusing, as it
can mean different things depending on its context:
 Prevention of users from falling victim — in this case,
phishing techniques will also be considered prevention
techniques.
 Prevention of attackers from starting phishing campaigns
— law suits and penalties against attackers by Law
Enforcement Agencies (LEAs) are considered as prevention
techniques.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201414
EVALUATION METRICS
PHISHING DETECTION-A LITERATURE SURVEY
15 2014DEPT.OF COMPUTER SCIENCE
DEPT.OF COMPUTER SCIENCE
DETECTION OF PHISHING ATTACKS
 Passive and Active Warnings
• Passive warnings — the warning does not block the
content-area and enables the user to view both the
content and the warning.
• Active warnings — the warning blocks the content-
data, which prohibits the user from viewing the content-
data while the warning is displayed
PHISHING DETECTION-A LITERATURE SURVEY
201416
FireFox displaying an active warning page
against a suspected unsafe site.
Displaying a passive warning page
against a suspected unsafe site.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201417
 Google Safe Browsing API
 Enables client applications to validate whether a given
URL exists in blacklists that are constantly updated by
Google.
 The current implementation of the protocol is provided by
Google.
 The API requires client applications to communicate with
providers through HTTP while adhering to syntax specified
in Protocolv2Spec.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201418
Algorithm 1 Protocolv2Spec phishing
detection in pseudo- code
1: Hf ← sha256(URL)
2: Ht ← truncate(Hf,32)
3: if Ht ∈ Hl then
4: for Hr ← queryProvider(Ht) do
5: if Hf = Hr then
6: warnPhishing(URL)
7: end if
8: end for
9: end if
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201419
 Visual similarity
 Classification with Discriminative Keypoint Features.
 This mechanism is agnostic to the underlying code or
technology that renders the final visual output to the
users eyes.
 Mimics a website using img tag.
 Snapshot is then matched with whitelist.
PHISHING DETECTION-A LITERATURE SURVEY
DEPT.OF COMPUTER SCIENCE 20 2014
PHISHING DETECTION-A LITERATURE SURVEY
DEPT.OF COMPUTER SCIENCE 21 2014
EVALUATION
 The study concluded that user training approaches are
promising. Virtually user training approaches increased TP
rate.
 Blacklists are able to achieve low FP rates. Ineffective
against zero- hour attacks.
 The effectiveness of visual similarity techniques might not
be accurately known, but rather assumed.
DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201422
CONCLUSION
 Phishing is a growing crime and one that we must be
aware of. Although laws have been enacted, education is
the best defence against phishing. Being a bit suspicious of
all electronic communications and websites is
recommmended. Lookout for the common characteristics -
sense of urgency, request for verification, and grammer and
spelling errors. Also, get in the habit of comparing the
provided URL with the an independent search for the
company's website.
PHISHING DETECTION-A LITERATURE SURVEY
23 2014DEPT.OF COMPUTER SCIENCE
REFERENCES
[1] Mahmoud Khonji, Youssef Iraqi, Senior Member, IEEE, and Andrew Jones. IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER
2013
[2] B. Krebs, “HBGary Federal hacked by Anonymous,”
http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011,
accessed December 2011.
[3] B. Schneier, “Lockheed Martin hack linked to RSA’s SecurID breach,”
http://www.schneier.com/blog/archives/2011/05/lockheed martin.html, 2011, accessed
December 2011.
[4] C. Whittaker, B. Ryner, and M. Nazif, “Large-scale automatic classifi- cation of phishing
pages,” in NDSS ’10, 2010.
[5] Anti-Phishing Working Group (APWG), “Phish- ing activity trends report — second half
2010,” http://apwg.org/reports/apwg report h2 2010.pdf, 2010, accessed December 2011.
[6] Anti-Phishing Working Group (APWG), “Phish- ing activity trends report —
second half 2011,” http://apwg.org/reports/apwg trends report h2 2011.pdf, 2011,
accessed July 2012
24 2014DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY
201425DEPT.OF COMPUTER SCIENCE
PHISHING DETECTION-A LITERATURE SURVEY

More Related Content

What's hot

Detection of Phishing Websites
Detection of Phishing Websites Detection of Phishing Websites
Detection of Phishing Websites Nikhil Soni
 
Spam email detection using machine learning PPT.pptx
Spam email detection using machine learning PPT.pptxSpam email detection using machine learning PPT.pptx
Spam email detection using machine learning PPT.pptxKunal Kalamkar
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detectionPartnered Health
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware DetectionKaspersky
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityPratap Dangeti
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 

What's hot (20)

Detection of Phishing Websites
Detection of Phishing Websites Detection of Phishing Websites
Detection of Phishing Websites
 
Spam email detection using machine learning PPT.pptx
Spam email detection using machine learning PPT.pptxSpam email detection using machine learning PPT.pptx
Spam email detection using machine learning PPT.pptx
 
Spam Detection Using Natural Language processing
Spam Detection Using Natural Language processingSpam Detection Using Natural Language processing
Spam Detection Using Natural Language processing
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
 
Spam Email identification
Spam Email identificationSpam Email identification
Spam Email identification
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Machine Learning in Malware Detection
Machine Learning in Malware DetectionMachine Learning in Malware Detection
Machine Learning in Malware Detection
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 

Viewers also liked

Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerMudit Dholakia
 
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Sarvesh Singh
 
Impostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHImpostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHastraid
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniquebhas_ani
 
Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)Michele Orru
 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emailsbutest
 
26.10.15 literature survey
26.10.15 literature survey26.10.15 literature survey
26.10.15 literature surveykavroom
 
Practical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XPractical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XMichele Orru
 
Application of image processing in material handling and (1)
Application of image processing in material handling and (1)Application of image processing in material handling and (1)
Application of image processing in material handling and (1)suyash dani
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...Ankur Mahajan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Materials handling
Materials handlingMaterials handling
Materials handlingRohit Verma
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint SlidesGeorge
 

Viewers also liked (20)

Facebook
FacebookFacebook
Facebook
 
Data quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometerData quality evaluation & orbit identification from scatterometer
Data quality evaluation & orbit identification from scatterometer
 
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
2010 ICMIT - Software Support for the Fuzzy Front End Stage of the Innovation...
 
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
 
Impostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHImpostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NH
 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
 
Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)Dark Fairytales from a Phisherman (Vol. II)
Dark Fairytales from a Phisherman (Vol. II)
 
Phishing
PhishingPhishing
Phishing
 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emails
 
26.10.15 literature survey
26.10.15 literature survey26.10.15 literature survey
26.10.15 literature survey
 
Practical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon XPractical Phishing Automation with PhishLulz - KiwiCon X
Practical Phishing Automation with PhishLulz - KiwiCon X
 
Application of image processing in material handling and (1)
Application of image processing in material handling and (1)Application of image processing in material handling and (1)
Application of image processing in material handling and (1)
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...
SELECTION OF MATERIAL HANDLING SYSTEM USING MULTI CRITERIA DECISION TECHNIQUE...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Doing a Literature Review
Doing a Literature ReviewDoing a Literature Review
Doing a Literature Review
 
Materials handling
Materials handlingMaterials handling
Materials handling
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 

Similar to Phishing Detection Survey

HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONIRJET Journal
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxrakhicse
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing TechniquesIRJET Journal
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...apidays
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Ce hv8 module 02 footprinting and reconnaissance
Ce hv8 module 02 footprinting and reconnaissanceCe hv8 module 02 footprinting and reconnaissance
Ce hv8 module 02 footprinting and reconnaissanceMehrdad Jingoism
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Editor IJMTER
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsIRJET Journal
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxjmiham
 

Similar to Phishing Detection Survey (20)

Towards detecting phishing web pages
Towards detecting phishing web pagesTowards detecting phishing web pages
Towards detecting phishing web pages
 
HIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTIONHIGH ACCURACY PHISHING DETECTION
HIGH ACCURACY PHISHING DETECTION
 
Artificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptxArtificial intelligence presentation slides.pptx
Artificial intelligence presentation slides.pptx
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
Plag detection
Plag detectionPlag detection
Plag detection
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
 
36.44.final
36.44.final36.44.final
36.44.final
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Ce hv8 module 02 footprinting and reconnaissance
Ce hv8 module 02 footprinting and reconnaissanceCe hv8 module 02 footprinting and reconnaissance
Ce hv8 module 02 footprinting and reconnaissance
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 

Recently uploaded

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Phishing Detection Survey

  • 1. Department of Computer Science & Engg College of Engineering, Submitted by Umme Ayesha
  • 2. CONTENT SL.NO TOPICS PAGE NO. 1 INTRODUCTION 1 2 OBJECTIVES 2 3 DEFINITIONS,MOTIVES,IMPORTANCE 3-7 5 MITIGATION OF PHISHING ATTACKS 8-12 6 DETECTION OF PHISHING ATTACKS 13-22 7 EVALUATIONOF PHISHING TECHNIQUES 23 8 CONCLUSION 24 9 REFERENCES 25 DEPT. OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 2014
  • 3. INTRODUCTION  PHISHING is a social engineering attack that aims at exploiting the weakness found in system processes as caused by system users.  For eg. user leak their passwords if an attacker asked them to update via http link.  Due to the broad nature of the phishing problem, this phishing detection survey was began. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 20141
  • 4. OBJECTIVES  Definitions  Phishing Campaign  Evaluation Metrics  Detection  Evaluation DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 2 2014
  • 5. DEFINITIONS  “Phishing is a fraudulent attempt, usually made through email, to steal your personal information”  “We define a phishing page as any web page that, without permission, alleges to act on behalf of a third party with the intention of confusing viewers into performing an action with which the viewer would only trust a true agent of the third party”  Phishing is a type of computer attack that communicates socially engineered messages to humans via electronic communication channels in order to persuade them to perform certain actions for the attacker’s benefit. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 3 2014
  • 6. PHISHING MOTIVES  The primary motives behind phishing attacks, from an attacker’s perspective, are:  Financial Gain: phishers can use stolen banking creden- tials to their financial benefits.  Identity Hiding: instead of using stolen identities directly, phishers might sell the identities to others whom might be criminals seeking ways to hide their identities and activities  Fame and Notoriety: phishers might attack victims for the sake of peer recognition. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 4 2014
  • 7. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 5 2014
  • 8. IMPORTANCE  According to APWG, phishing attacks were in a raise till August, 2009 40,621 unique phishing reports were submitted to APWG.  Drop in campaign due disappearence of Avanlanche gang. (2010-11)  Avalanche gang from traditional phishing campaigns into malware-based phishing campaigns. (raise) PHISHING DETECTION-A LITERATURE SURVEY DEPT.OF COMPUTER SCIENCE 6 2014
  • 9. PHISHING DETECTION-A LITERATURE SURVEY DEPT.OF COMPUTER SCIENCE 7 2014
  • 10. MITIGATION OF PHISHING ATTACKS Once the phishing attack is detected, a number of actions could be applied against the campaign. The following categories of approaches exist:  Detection approaches  Offensive Defence Approach  Correction Approach  Prevention Approach DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 8 2014
  • 11. PHISHING DETECTION-A LITERATURE SURVEY DEPT.OF COMPUTER SCIENCE 20149
  • 12. (1) Detection Approaches  User Training Approaches - end-users can be educated to better understand the nature of phishing attacks, phishing and non-phishing messages.  Software classification approaches — these mitigation approaches aim at classifying phishing and legitimate messages on behalf of the user in an attempt to bridge the gap that is left due to the human error or ignorance. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201410
  • 13. (2) Offensive Defence Approach  Offensive defence solutions aim to render phishing cam- pains useless for the attackers by disrupting the phishing campaigns.  This is often achieved by flooding phishing web- sites with fake credentials so that the attacker would have a difficult time to find the real credentials.  Example, BogusBiter : A browser toolbar that submits fake information in HTML forms whenever a phishing website is encountered. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201411
  • 14. (3)Correction Approach Correction is the act of taking the phishing resources down. This is often achieved by reporting attacks to Service Providers. Phishing campaigns often rely on resources, such as:  Websites  E-mail messages  Social Networking services In order to correct such attempts • Removal of phishing content from websites, or suspension of hosting services. • Suspension of email accounts, SMTP relays, VoIP ser vices. • Trace back and shutdown of botnets. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201412
  • 15. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 13 2014
  • 16. (4)Prevention Approaches The “prevention” of phishing attacks can be confusing, as it can mean different things depending on its context:  Prevention of users from falling victim — in this case, phishing techniques will also be considered prevention techniques.  Prevention of attackers from starting phishing campaigns — law suits and penalties against attackers by Law Enforcement Agencies (LEAs) are considered as prevention techniques. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201414
  • 17. EVALUATION METRICS PHISHING DETECTION-A LITERATURE SURVEY 15 2014DEPT.OF COMPUTER SCIENCE
  • 18. DEPT.OF COMPUTER SCIENCE DETECTION OF PHISHING ATTACKS  Passive and Active Warnings • Passive warnings — the warning does not block the content-area and enables the user to view both the content and the warning. • Active warnings — the warning blocks the content- data, which prohibits the user from viewing the content- data while the warning is displayed PHISHING DETECTION-A LITERATURE SURVEY 201416
  • 19. FireFox displaying an active warning page against a suspected unsafe site. Displaying a passive warning page against a suspected unsafe site. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201417
  • 20.  Google Safe Browsing API  Enables client applications to validate whether a given URL exists in blacklists that are constantly updated by Google.  The current implementation of the protocol is provided by Google.  The API requires client applications to communicate with providers through HTTP while adhering to syntax specified in Protocolv2Spec. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201418
  • 21. Algorithm 1 Protocolv2Spec phishing detection in pseudo- code 1: Hf ← sha256(URL) 2: Ht ← truncate(Hf,32) 3: if Ht ∈ Hl then 4: for Hr ← queryProvider(Ht) do 5: if Hf = Hr then 6: warnPhishing(URL) 7: end if 8: end for 9: end if DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201419
  • 22.  Visual similarity  Classification with Discriminative Keypoint Features.  This mechanism is agnostic to the underlying code or technology that renders the final visual output to the users eyes.  Mimics a website using img tag.  Snapshot is then matched with whitelist. PHISHING DETECTION-A LITERATURE SURVEY DEPT.OF COMPUTER SCIENCE 20 2014
  • 23. PHISHING DETECTION-A LITERATURE SURVEY DEPT.OF COMPUTER SCIENCE 21 2014
  • 24. EVALUATION  The study concluded that user training approaches are promising. Virtually user training approaches increased TP rate.  Blacklists are able to achieve low FP rates. Ineffective against zero- hour attacks.  The effectiveness of visual similarity techniques might not be accurately known, but rather assumed. DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY 201422
  • 25.
  • 26. CONCLUSION  Phishing is a growing crime and one that we must be aware of. Although laws have been enacted, education is the best defence against phishing. Being a bit suspicious of all electronic communications and websites is recommmended. Lookout for the common characteristics - sense of urgency, request for verification, and grammer and spelling errors. Also, get in the habit of comparing the provided URL with the an independent search for the company's website. PHISHING DETECTION-A LITERATURE SURVEY 23 2014DEPT.OF COMPUTER SCIENCE
  • 27. REFERENCES [1] Mahmoud Khonji, Youssef Iraqi, Senior Member, IEEE, and Andrew Jones. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013 [2] B. Krebs, “HBGary Federal hacked by Anonymous,” http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011, accessed December 2011. [3] B. Schneier, “Lockheed Martin hack linked to RSA’s SecurID breach,” http://www.schneier.com/blog/archives/2011/05/lockheed martin.html, 2011, accessed December 2011. [4] C. Whittaker, B. Ryner, and M. Nazif, “Large-scale automatic classifi- cation of phishing pages,” in NDSS ’10, 2010. [5] Anti-Phishing Working Group (APWG), “Phish- ing activity trends report — second half 2010,” http://apwg.org/reports/apwg report h2 2010.pdf, 2010, accessed December 2011. [6] Anti-Phishing Working Group (APWG), “Phish- ing activity trends report — second half 2011,” http://apwg.org/reports/apwg trends report h2 2011.pdf, 2011, accessed July 2012 24 2014DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY
  • 28. 201425DEPT.OF COMPUTER SCIENCE PHISHING DETECTION-A LITERATURE SURVEY