- Open Access
- Total Downloads : 587
- Authors : Parth Parmar, Kalpesh Patel
- Paper ID : IJERTV3IS030830
- Volume & Issue : Volume 03, Issue 03 (March 2014)
- Published (First Online): 20-03-2014
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Comparison of Phishing Detection Techniques
Parth Parmar
Computer Science & Engineering Department
L.D. Institute of Technology Ahmedabad, India
Kalpesh Patel
Computer Science & Engineering Department
-
Institute of Technology
Ahmedabad, India
AbstractEmail has become a popular topic of discussion in today's world. Each month, more & more attacks are launched at the purpose of making web-users believe that they are dealing with a trusted & reliable entity for the purpose of stealing logon credentials, account information and identity information.This type of attack is known as 'phishing'. In this paper we will study about overview of phishing detection and approaches used in respective techniques. This study will help us to build much more strong and robust technique for detection of phished emails by combining multiple techniques and getting a better result.
Keywords Phishing, email, phishing detection, comparison.
-
INTRODUCTION
According to the survey of Radicati group from April 2010,there are about 1.9 billion users of email worldwide [1]. A 2012 global study reports that 556 million victims per year due to cyber crimes and one of the reasons could be 44% of adult access e-mails via free or unsecured Wi-Fi connections[2].Phishing is a worldwide problem which creates a great effect on both buisness and consumers.The number of worldwide email accounts is expected to increase from an installed base of 3.1 billion in 2011 to nearly 4.1 billion by year-end 2015. This represents an average annual growth rate of 7% over the next four years [3]. It aims at exploiting the weakness in the users. For example, as evaluated in [4], end- users failed to detect 29% of phishing attacks even when trained with the best performing user awareness program.
Due to vast and broad nature of phishing problem,this detection of phished emails study begins by :
-
Defining a phishing problem.
-
Life Cycle of phishing campaign.
-
Detection Approaches.
-
Learned lessons from above approaches.
Payment Services continued to be the most-targeted industry sector. Most sectors remained consistent with the first quarter of 2013, except for computer and online gaming, which experienced a notable drop from 5.66 percent in Q1 2013 to
-
percent in Q2 2013.
Fig.1 Statistical Highlights for 2nd Quarter2013 to APWG. Source: [5]
-
-
DEFINING A PHISHING PROBLEM
The Definition of phishing is not consistent as phishing problem is broad and discusses about various scenarios .For example, according to PhishTank:
Phishing is a fraudulent attempt, normally made through email, to steal your personal information
But this definition limits the phishing attacks as it is not only concerned with stealing the personal information. For example, a message can tempt the victim to install a script which would in turn transfer the money to the attacker's account, without the need to steal the personal information.
Another definition is provided by Colin Whittaker e. al.[6]:
We define a phishing page as any web page that, without permission, alleges to act on behalf of a third party with the intention of confusing viewers into performing an action with which the viewer would only trust a true agent of the third party
-
LIFE CYCLE OF PHISHING CAMPAIGN
An e-mail campaign is a unique e-mail sent out to multiple number of users, redirecting them to a specific phishing web site .
Fig.2 Statistical Highlights for 2nd Quarter2013 to APWG.
Source: [5]
Whenever a phishing campaign is started (e.g. by sending phishing emails to users), the first security measure is to detect the campaign. The detection techniques are large enough and could involve techniques used by service providers to detect the attacks, user awareness programs, and end-user client software classification.
Fig.3 The life-cycle of phishing campaigns from the perspective of anti- phishing techniques. Source :[7]
The ability of detecting phishing campaigns can be enhanced more whenever a phishing campaign is detected through learning from such experience. For example, by learning from previous phishing campaigns, it is possible to improve the detection of future phishing campaigns. Such learning can be performed by either a software, or human observer(who is well-known about identifying phishing campaign).
Once the phishing campaign is detected actions like offensive defense, correction and prevention can be applied. However, if the phishing campaign is not detected , then none
of the above actions can be applied. This focuses on the importance of the detection phase.
-
DETECTION APPROACHES
The detection solutions of phished emails can be basically classified into two types:
-
User training approaches : End-users can be educated to understand the nature of the phishing attack. This is contrary to the categorization in [8] where user training was considered a preventative approach.
-
Software classification approaches : Build automated software classifiers.
Fig.4 Overview of phishing detection approaches.
TABLE I
COMPARISON THE ADVANTAGES AND DISADVANTAGES BETWEEN PHISHING DETECTION TECHNIQUES
Detection Technique
Advantages
Disadvantages
Blacklists
-Requiring
low
-Mitigation of
resources on host
zero-hour phishing
machine
attacks.
-Effective
when
-Can result in
minimal FP rates
excessive queries
are required.
with heavily
loaded servers.
Heuristics and
-Mitigate
zero-
-Higher FP rate
visual similarity
hour attacks.
than blacklists.
-High computatio-
nal cost.
Machine Learning
-Mitigate
zero-
-Time consuming.
hour attacks.
-Costly.
-Constuct
own
-Huge number of
classification
rules.
models.
-
-
SUMMARY
-
The Comparison of techniques has shown that Machine Learning techniques are most promising, but it also has the disadvantages of greater computational cost. New techniques can be developed for having low false positives by combining blacklists and heuristics approaches. As a future work, phishing detection techniques from the perspective of thier computational cost and energy consumption can be thought of.
REFERENCES
-
http://www.radicati.com
-
N Sridhar,D.L. Bhaskari and P.S. Avadhani; Inverted Pyramid Approach for E-Mail Forensics Using Heterogeneous Forensics Tools. n CSI Communications(July 2013) 21-23.
-
Sara Radicati Email Statistics Report,2011-2015
-
S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs,Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions, in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI 10.New York, NY, USA: ACM, 2010, pp. 373382.
-
APWG ,Phishing Activity trends reports, April-June 2013.
-
C. Whittaker, B. Ryner, and M. Nazif, Large-scale automatic classification of phishing pages, in NDSS 10, 2010.
-
Khonji, Mahmoud; Iraqi, Youssef; Jones, Andrew, "Phishing Detection: A Literature Survey," Communications Surveys & Tutorials, IEEE , vol.15, no.4, pp.2091,2121, Fourth Quarter 2013.
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, A comparison of machine learning techniques for phishing detection, in Proceedings of the anti- phishing working groups 2nd annual eCrime researchers summit, ser. eCrime 07. New York, NY, USA: ACM, 2007, pp. 60 69.