Presentation | 2012-06-22 Proposed phishing countermeasures based on URL information analysis Shingo MATSUGAYA, Naoshi SATO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Although phishing has been prevented by various countermeasures, there are still many victims both at home and abroad. We analyzed the phishing URL information in order to investigate the cause, and found that the phishing URL becomes difficult to distinguish and tends to be mistaken for legitimate URL, comparing with the previous study results by McGrath et al. in 2008. We also found that 65% of the phishing pages are falsified websites, and that in many cases phishers exploit the websites of the light users with inexpensive rental servers. So we proposed a server-side countermeasure using whitelist filtering which can be easily introduced by website operator, experimented the countermeasure and evaluated its effectiveness. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Phishing / Anti-Phishing / URL information analysis |
Paper # | IA2012-6,ICSS2012-6 |
Date of Issue |
Conference Information | |
Committee | IA |
---|---|
Conference Date | 2012/6/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Internet Architecture(IA) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proposed phishing countermeasures based on URL information analysis |
Sub Title (in English) | |
Keyword(1) | Phishing |
Keyword(2) | Anti-Phishing |
Keyword(3) | URL information analysis |
1st Author's Name | Shingo MATSUGAYA |
1st Author's Affiliation | Graduate school of Information Security, Institute of Information Security() |
2nd Author's Name | Naoshi SATO |
2nd Author's Affiliation | Graduate school of Information Security, Institute of Information Security |
Date | 2012-06-22 |
Paper # | IA2012-6,ICSS2012-6 |
Volume (vol) | vol.112 |
Number (no) | 90 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |