skip to main content
10.1145/3055186.3055188acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Detecting Phishing Websites using Automation of Human Behavior

Published:02 April 2017Publication History

ABSTRACT

In this paper, we propose a technique to detect phishing attacks based on behavior of human when exposed to fake website. Some online users submit fake credentials to the login page before submitting their actual credentials. He/She observes the login status of the resulting page to check whether the website is fake or legitimate. We automate the same behavior with our application (FeedPhish) which feeds fake values into login page. If the web page logs in successfully, it is classified as phishing otherwise it undergoes further heuristic filtering. If the suspicious site passes through all heuristic filters then the website is classified as a legitimate site. As per the experimentation results, our application has achieved a true positive rate of 97.61%, true negative rate of 94.37% and overall accuracy of 96.38%. Our application neither demands third party services nor prior knowledge like web history, whitelist or blacklist of URLS. It is able to detect not only zero-day phishing attacks but also detects phishing sites which are hosted on compromised domains.

References

  1. HTTrack Website Copier - Free Software Offline Browser (GNU GPL). https://www.httrack.com/.Google ScholarGoogle Scholar
  2. Jsoup Java HTML Parser, with best of DOM, CSS, and jquery. https://jsoup.org/.Google ScholarGoogle Scholar
  3. Selenium. http://docs.seleniumhq.org/download/.Google ScholarGoogle Scholar
  4. Wget - GNU Project - Free Software Foundation. https://www.gnu.org/software/wget/.Google ScholarGoogle Scholar
  5. Phishing attack trends reports, 4th quarter 2015. http://docs.apwg.org/reports/apwg_trends_report_q4_2015.pdf, 2015. Accessed: 2016-06-01.Google ScholarGoogle Scholar
  6. APWG. Phishing attack trends reports, first quarter 2016. http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf, 2016. Accessed: 2016-06-01.Google ScholarGoogle Scholar
  7. Y. Cao, W. Han, and Y. Le. Anti-phishing based on automated individual white-list. In Proceedings of the 4th ACM workshop on Digital identity management, pages 51--60. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. L. Chiew, E. H. Chang, W. K. Tiong, et al. Utilisation of website logo for phishing detection. Computers & Security, 54:16--26, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Chou, R. Ledesma, Y. Teraguchi, J. C. Mitchell, et al. Client-side defense against web-based identity theft. In NDSS, 2004.Google ScholarGoogle Scholar
  10. A. Y. Fu, L. Wenyin, and X. Deng. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (emd). IEEE transactions on dependable and secure computing, 3(4):301--311, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode, pages 1--8. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Hara, A. Yamada, and Y. Miyake. Visual similarity-based phishing detection without victim site information. In Computational Intelligence in Cyber Security, 2009. CICS'09. IEEE Symposium on, pages 30--36. IEEE, 2009. Google ScholarGoogle ScholarCross RefCross Ref
  13. M. He, S.-J. Horng, P. Fan, M. K. Khan, R.-S. Run, J.-L. Lai, R.-J. Chen, and A. Sutanto. An efficient phishing webpage detector. Expert Systems with Applications, 38(10):12018--12027, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. Joshi, S. Saklikar, D. Das, and S. Saha. Phishguard: A browser plug-in for protection from phishing. In Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008. 2nd International Conference on, pages 1--6. IEEE, 2008. Google ScholarGoogle ScholarCross RefCross Ref
  15. H. Kazemian and S. Ahmed. Comparisons of machine learning techniques for detecting malicious webpages. Expert Systems with Applications, 42(3):1166 -- 1177, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Mensah, G. Blanc, K. Okada, D. Miyamoto, and Y. Kadobayashi. Ajna: Anti-phishing js-based visual analysis, to mitigate users' excessive trust in ssl/tls.Google ScholarGoogle Scholar
  17. M. Moghimi and A. Y. Varjani. New rule-based phishing detection method. Expert systems with applications, 53:231--242, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Pan and X. Ding. Anomaly based web phishing page detection. In Proceedings - Annual Computer Security Applications Conference, ACSAC, volume 6, pages 381--392, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta. Phishnet: Predictive blacklisting to detect phishing attacks. In INFOCOM, 2010 Proceedings IEEE, pages 1--5. IEEE, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Ramesh, I. Krishnamurthi, and K. S. S. Kumar. An efficacious method for detecting phishing webpages through target domain identification. Decision Support Systems, 61:12 -- 22, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  21. R. S. Rao and S. T. Ali. A computer vision technique to detect phishing attacks. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, pages 596--601. IEEE, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  22. R. S. Rao. and S. T. Ali. Phishshield: A desktop application to detect phishing webpages through heuristic approach. Procedia Computer Science, 54:147--156, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  23. H. Shahriar and M. Zulkernine. Trustworthiness testing of phishing websites: A behavior model-based approach. Future Generation Computer Systems, 28(8):1258--1271, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. L. Tan, K. L. Chiew, et al. Phishing website detection using url-assisted brand name weighting system. In 2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), pages 054--059. IEEE, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  25. C. L. Tan, K. L. Chiew, K. Wong, and S. N. Sze. Phishwho: Phishing webpage detection via identity keywords extraction and target domain name finder. Decision Support Systems, 88:18 -- 27, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. T. Van Goethem, F. Piessens, W. Joosen, and N. Nikiforakis. Clubbing seals: Exploring the ecosystem of third-party security seals. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 918--929. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. G. Varshney, M. Misra, and P. K. Atrey. A phish detector using lightweight search features. Computers & Security, 62:213 -- 228, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  28. L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng. Detection of phishing webpages based on visual similarity. In Special interest tracks and posters of the 14th international conference on World Wide Web, pages 1060--1061. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. G. Xiang, J. Hong, C. P. Rose, and L. Cranor. CantinaGoogle ScholarGoogle Scholar
  30. : A feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security (TISSEC), 14(2):21, 2011.Google ScholarGoogle Scholar
  31. J. Zhang, P. A. Porras, and J. Ullrich. Highly predictive blacklisting. In USENIX Security Symposium, pages 107--122, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. In Proceedings of the 16th international conference on World Wide Web, pages 639--648. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Detecting Phishing Websites using Automation of Human Behavior

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CPSS '17: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security
      April 2017
      120 pages
      ISBN:9781450349567
      DOI:10.1145/3055186

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CPSS '17 Paper Acceptance Rate10of35submissions,29%Overall Acceptance Rate33of113submissions,29%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader