A novel anti-phishing framework based on honeypots

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:ad6a908fe0861a890142c7a2413e0b42

LI, Shujun, Roland SCHMITZ, 2009. A novel anti-phishing framework based on honeypots. 2009 eCrime Researchers Summit (eCRIME). Tacoma, WA, USA, 20. Sep 2009 - 21. Okt 2009. In: 2009 eCrime Researchers Summit. 2009 eCrime Researchers Summit (eCRIME). Tacoma, WA, USA, 20. Sep 2009 - 21. Okt 2009. IEEE, pp. 1-13. ISBN 978-1-4244-4625-4

@inproceedings{Li2009-10novel-6020, title={A novel anti-phishing framework based on honeypots}, year={2009}, doi={10.1109/ECRIME.2009.5342609}, isbn={978-1-4244-4625-4}, publisher={IEEE}, booktitle={2009 eCrime Researchers Summit}, pages={1--13}, author={Li, Shujun and Schmitz, Roland} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/6020"> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:08:47Z</dcterms:available> <dc:contributor>Schmitz, Roland</dc:contributor> <dc:creator>Li, Shujun</dc:creator> <dcterms:abstract xml:lang="eng">As a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new phishing sites can be earlier detected and quickly shut down. Another popular use of honeypots is to collect useful information about phishers' activities, which is used to make various kinds of statistics for the purposes of research and forensics. Recently, it has also been proposed to actively feed phishers with honeytokens. In the present paper, we discuss some problems of existing anti-phishing solutions based on honeypots. We propose to overcome these problems by transforming the real e-banking system itself into a honeypot equipped with honeytokens and supported by some other kinds of honeypots. A phishing detector is used to automatically detect suspicious phishers' attempts of stealing money from victims' accounts, and then ask for the potential victims' reconfirmation. This leads to a novel anti-phishing framework based on honeypots. As an indispensable part of the framework, we also propose to use phoneybots, i.e., active honeypots running in virtual machines and mimicking real users' behavior to access the real e-banking system automatically, in order to submit honeytokens to pharmers and phishing malware. The involvement of phoneybots is crucial to fight against advanced phishing attacks such as pharming and malware-based phishing attacks.</dcterms:abstract> <dc:contributor>Li, Shujun</dc:contributor> <dcterms:bibliographicCitation>First publ. in: eCrime Researchers Summit, 2009 : eCRIME '09 , Proceedings of 4th Annual APWG [Oct. 20-21, 2009, Tacoma,Washington]. Piscataway, NJ : IEEE, 2009. pp. 1 - 13</dcterms:bibliographicCitation> <dc:creator>Schmitz, Roland</dc:creator> <dcterms:issued>2009-10</dcterms:issued> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6020"/> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:08:47Z</dc:date> <dc:language>eng</dc:language> <dcterms:title>A novel anti-phishing framework based on honeypots</dcterms:title> <dc:format>application/pdf</dc:format> <dcterms:rights rdf:resource="http://nbn-resolving.org/urn:nbn:de:bsz:352-20140905103416863-3868037-7"/> <dc:rights>deposit-license</dc:rights> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

Li_2_APWG_eCRS2009.pdf 520

Das Dokument erscheint in:

KOPS Suche


Stöbern

Mein Benutzerkonto