Examining the effectiveness of phishing filters against DNS based phishing attacks

– This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. , – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. , – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. , – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.

[1]  Xi Chen,et al.  Assessing the severity of phishing attacks: A hybrid data mining approach , 2011, Decis. Support Syst..

[2]  Steven Furnell,et al.  The irreversible march of technology , 2009, Inf. Secur. Tech. Rep..

[3]  Amir Herzberg,et al.  Security and identification indicators for browsers against spoofing and phishing attacks , 2008, TOIT.

[4]  Adrian Perrig,et al.  Phoolproof Phishing Prevention , 2006, Financial Cryptography.

[5]  Dario Forte,et al.  Phishing Attacks: Anatomy of a phishing attack: A high-level overview , 2009 .

[6]  Markus Jakobsson,et al.  What Instills Trust? A Qualitative Study of Phishing , 2007, Financial Cryptography.

[7]  Swapan Purkait,et al.  An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website , 2014, Inf. Manag. Comput. Secur..

[8]  Xiaotie Deng,et al.  An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.

[9]  Suku Nair,et al.  Bypassing Security Toolbars and Phishing Filters via DNS Poisoning , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Swapan Purkait,et al.  Exploring the Factors that Influence an Internet User's Ability to Correctly Identify Phishing Websites , 2012 .

[11]  Swapan Purkait,et al.  Information Management & Computer Security Phishing counter measures and their effectiveness – literature review , 2016 .

[12]  Swapan Purkait,et al.  Virtual Browser: An On-Demand Service to Prevent Phishing Attacks , 2012 .

[13]  Xin Luo,et al.  How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model , 2012, 2012 45th Hawaii International Conference on System Sciences.

[14]  B. J. Fogg,et al.  What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.

[15]  Markus Jakobsson,et al.  Why and How to Perform Fraud Experiments , 2008, IEEE Security & Privacy.

[16]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[17]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[18]  Lorrie Faith Cranor,et al.  Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.

[19]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[20]  Linfeng Li,et al.  Usability evaluation of anti-phishing toolbars , 2007, Journal in Computer Virology.

[21]  Amir Herzberg,et al.  Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..

[22]  Elizabeth Sillence,et al.  It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..

[23]  S. Furnell Phishing: can we spot the signs? , 2007 .

[24]  Elizabeth V. Mulig,et al.  PHISHING, PHARMING AND IDENTITY THEFT , 2007 .

[25]  JungMin Kang,et al.  Advanced White List Approach for Preventing Access to Phishing Sites , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[26]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[27]  Philip Hunter,et al.  2005 IT security highlights - the day of the amateur hacker has gone, but there are still plenty of amateur users… , 2006 .

[28]  Mohsen Sharifi,et al.  A phishing sites blacklist generator , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[29]  Maria Papadaki,et al.  Social engineering: assessing vulnerabilities in practice , 2009, Inf. Manag. Comput. Secur..