[go: up one dir, main page]

Britt et al., 2012 - Google Patents

Clustering Potential Phishing Websites Using {DeepMD5}

Britt et al., 2012

View PDF
Document ID
69454832105355524
Author
Britt J
Wardman B
Sprague A
Warner G
Publication year
Publication venue
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12)

External Links

Snippet

Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing problem. Examining and …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Javed et al. A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions
US10218740B1 (en) Fuzzy hash of behavioral results
US10505986B1 (en) Sensor based rules for responding to malicious activity
CN103843003B (en) The method of recognition network fishing website
Britt et al. Clustering Potential Phishing Websites Using {DeepMD5}
US8769695B2 (en) Phish probability scoring model
Rao et al. Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach
Niakanlahiji et al. Phishmon: A machine learning framework for detecting phishing webpages
Mohaisen et al. Unveiling zeus: automated classification of malware samples
Abubakar et al. A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems
US8955133B2 (en) Applying antimalware logic without revealing the antimalware logic to adversaries
Chu et al. Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs
Wardman et al. High-performance content-based phishing attack detection
Xiao et al. From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild
CN106650799B (en) A kind of electronic evidence classification extracting method and system
Singh et al. Investigating the effect of feature selection and dimensionality reduction on phishing website classification problem
Abraham et al. Approximate string matching algorithm for phishing detection
Priya et al. Detection of phishing websites using C4. 5 data mining algorithm
US8910281B1 (en) Identifying malware sources using phishing kit templates
Huh et al. A comprehensive analysis of today’s malware and its distribution network: Common adversary strategies and implications
Zawoad et al. Phish-net: investigating phish clusters using drop email addresses
Shrestha et al. High-performance classification of phishing URLs using a multi-modal approach with MapReduce
Wardman et al. New tackle to catch a phisher
Li et al. Spoofingguard: A content-agnostic framework for email spoofing detection via delivery graph
Wardman et al. Reeling in big phish with a deep md5 net