首页> 外文会议>IEEE Symposium on Security and Privacy >PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
【24h】

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists

机译:PhishFarm:用于衡量针对浏览器网络钓鱼黑名单的逃避技术的有效性的可扩展框架

获取原文

摘要

Phishing attacks have reached record volumes in recent years. Simultaneously, modern phishing websites are growing in sophistication by employing diverse cloaking techniques to avoid detection by security infrastructure. In this paper, we present PhishFarm: a scalable framework for methodically testing the resilience of anti-phishing entities and browser blacklists to attackers' evasion efforts. We use PhishFarm to deploy 2,380 live phishing sites (on new, unique, and previously-unseen .com domains) each using one of six different HTTP request filters based on real phishing kits. We reported subsets of these sites to 10 distinct anti-phishing entities and measured both the occurrence and timeliness of native blacklisting in major web browsers to gauge the effectiveness of protection ultimately extended to victim users and organizations. Our experiments revealed shortcomings in current infrastructure, which allows some phishing sites to go unnoticed by the security community while remaining accessible to victims. We found that simple cloaking techniques representative of real-world attacks- including those based on geolocation, device type, or JavaScript- were effective in reducing the likelihood of blacklisting by over 55% on average. We also discovered that blacklisting did not function as intended in popular mobile browsers (Chrome, Safari, and Firefox), which left users of these browsers particularly vulnerable to phishing attacks. Following disclosure of our findings, anti-phishing entities are now better able to detect and mitigate several cloaking techniques (including those that target mobile users), and blacklisting has also become more consistent between desktop and mobile platforms- but work remains to be done by anti-phishing entities to ensure users are adequately protected. Our PhishFarm framework is designed for continuous monitoring of the ecosystem and can be extended to test future state-of-the-art evasion techniques used by malicious websites.
机译:近年来,网络钓鱼攻击已达到创纪录的水平。同时,现代网络钓鱼网站通过采用各种隐蔽技术来避免被安全基础结构检测,从而变得越来越复杂。在本文中,我们介绍了PhishFarm:这是一个可扩展的框架,用于系统地测试反网络钓鱼实体和浏览器黑名单对攻击者的逃避工作的恢复能力。我们使用PhishFarm使用基于真实网络钓鱼工具包的六个不同HTTP请求过滤器之一部署2380个实时网络钓鱼站点(在新的,唯一的和以前不可见的.com域上)。我们向10个不同的反网络钓鱼实体报告了这些站点的子集,并测量了主要Web浏览器中本机黑名单的出现和及时性,以评估最终扩展到受害用户和组织的保护的有效性。我们的实验揭示了当前基础架构的缺陷,该缺陷使某些网络钓鱼站点在安全社区未被发现的同时仍可为受害者所用。我们发现,代表真实世界攻击的简单隐蔽技术(包括基于地理位置,设备类型或JavaScript的隐蔽技术)有效地将黑名单的可能性平均降低了55%以上。我们还发现,黑名单无法在流行的移动浏览器(Chrome,Safari和Firefox)中正常运行,这使这些浏览器的用户特别容易受到网络钓鱼攻击。在披露了我们的发现之后,反网络钓鱼实体现在能够更好地检测和缓解多种隐蔽技术(包括针对移动用户的隐匿技术),并且黑名单在台式机和移动平台之间也变得更加一致,但仍有工作要做反网络钓鱼实体,以确保用户得到足够的保护。我们的PhishFarm框架旨在持续监控生态系统,并且可以扩展以测试恶意网站所使用的未来最先进的逃避技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号