메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A novel anti-phishing framework based on honeypots

Author keywords

Honeypot; Honeytoken; Money mule; Online banking; Phishing; Phoneybot; Phoneypot; Phoneytoken

Indexed keywords

ANTI-PHISHING; E-BANKING; HONEYPOTS; MALWARES; ON-LINE BANKING; PHISHERS; PHISHING; PHISHING ATTACKS; RUNNING-IN; SECURITY SERVICES; SHUT DOWN; VIRTUAL MACHINES;

EID: 72449130877     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECRIME.2009.5342609     Document Type: Conference Paper
Times cited : (38)

References (54)
  • 3
    • 35348877312 scopus 로고    scopus 로고
    • Syngress Publishing, Inc
    • L. James, Phishing Exposed. Syngress Publishing, Inc., 2005.
    • (2005) Phishing Exposed
    • James, L.1
  • 5
    • 72449198352 scopus 로고    scopus 로고
    • Imperva, Inc, Online, Available
    • Imperva, Inc., "Securesphere defense note: Phishing and cross-site scripting," 2004. [Online]. Available: http://www.securitytechnet.com/ resource/rsc-center2/vendor-wp/imperva/20050606Imperva-SecureSphere-Defense- Note-Phishing.pdf
    • (2004) Securesphere defense note: Phishing and cross-site scripting
  • 6
    • 84862210539 scopus 로고    scopus 로고
    • Online, Available
    • Nexus, "Applying XSS to phishing attacks," 2007. [Online]. Available: http://www.playhack.net/view.php?type=1&id=20
    • (2007) Applying XSS to phishing attacks
    • Nexus1
  • 7
    • 72449165279 scopus 로고    scopus 로고
    • J. Yaneza, Spy-phishing: A new breed of blended threats, in Proc. Virus Bulletin Conference 2006, 2006. [Online]. Available: http://www.trendmicro.com/NR/rdonlyres/AC48648F-50D0-49F5-8438-7AEE516C501E/ 21322/spyphishing-102006.pdf
    • J. Yaneza, "Spy-phishing: A new breed of blended threats," in Proc. Virus Bulletin Conference 2006, 2006. [Online]. Available: http://www.trendmicro.com/NR/rdonlyres/AC48648F-50D0-49F5-8438-7AEE516C501E/ 21322/spyphishing-102006.pdf
  • 9
    • 38149086751 scopus 로고    scopus 로고
    • Drive-by pharm-ing
    • Information and Communications Security Proc. ICICS'2007, Springer
    • S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-by pharm-ing," in Information and Communications Security (Proc. ICICS'2007), ser. Lecture Notes in Computer Science, vol. 4861. Springer, 2008, pp. 495-506.
    • (2008) ser. Lecture Notes in Computer Science , vol.4861 , pp. 495-506
    • Stamm, S.1    Ramzan, Z.2    Jakobsson, M.3
  • 10
    • 72449143987 scopus 로고    scopus 로고
    • US Office of the Comptroller of the Currency, Online, Available
    • US Office of the Comptroller of the Currency, "Money laundering: A banker's guide to avoiding problems," 2002. [Online]. Available: http://www.comptrollerofthecurrency.gov/moneylaundering2002.pdf
    • (2002) Money laundering: A banker's guide to avoiding problems
  • 11
    • 60649111418 scopus 로고    scopus 로고
    • Delayed password disclosure
    • M. Jakobsson and S. Myers, "Delayed password disclosure," ACM SIGACT News, vol. 38, no. 3, pp. 56-75, 2007.
    • (2007) ACM SIGACT News , vol.38 , Issue.3 , pp. 56-75
    • Jakobsson, M.1    Myers, S.2
  • 13
    • 33745867321 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • ACM
    • M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?" in Proc. CHI'2006. ACM, 2006, pp. 601-610.
    • (2006) Proc. CHI'2006 , pp. 601-610
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 15
    • 77953890234 scopus 로고    scopus 로고
    • Password rescue: A new approach to phishing prevention
    • D. Florêncio and C. Herley, "Password rescue: A new approach to phishing prevention," in Proc. USENIX HotSec'2006, 2006, pp. 7-11.
    • (2006) Proc. USENIX HotSec'2006 , pp. 7-11
    • Florêncio, D.1    Herley, C.2
  • 16
    • 67249096586 scopus 로고    scopus 로고
    • The consequence of non-cooperation in the fight against phishing
    • IEEE Computer Society
    • T. Moore and R. Clayton, "The consequence of non-cooperation in the fight against phishing," in Proc. APWG eCRS'2008. IEEE Computer Society, 2008.
    • (2008) Proc. APWG eCRS'2008
    • Moore, T.1    Clayton, R.2
  • 19
    • 70349653942 scopus 로고    scopus 로고
    • QR-TAN: Secure mobile transaction authentication
    • IEEE Computer Society
    • G. Starnberger, L. Froihofer, and K. M. Goeschka, "QR-TAN: Secure mobile transaction authentication," in Proc. ARES'2009. IEEE Computer Society, 2009, pp. 578-583.
    • (2009) Proc. ARES'2009 , pp. 578-583
    • Starnberger, G.1    Froihofer, L.2    Goeschka, K.M.3
  • 20
    • 72449127918 scopus 로고    scopus 로고
    • Online, Available
    • Postbank, "mTAN now free for all customers," 2008. [Online]. Available: http://www.postbank.com/pbcom-ag-home/pbcom-pr-press/pbcom-pr-press- archives/pbcom-pr-press-archives-2008/pbcom-pr-pm1063-19-05-08.html
    • (2008) mTAN now free for all customers
  • 21
    • 72449200478 scopus 로고    scopus 로고
    • Irish Times, Suspended term for €12,000 bank 'phishing' scam, 2009. [Online]. Available: http://www.irishtimes.com/newspaper/ ireland/2009/0214/1233867937480.html
    • Irish Times, "Suspended term for €12,000 bank 'phishing' scam," 2009. [Online]. Available: http://www.irishtimes.com/newspaper/ ireland/2009/0214/1233867937480.html
  • 22
    • 67650684865 scopus 로고    scopus 로고
    • Plugging the phishing hole: Legislation versus technology
    • Online, Available
    • R. L. B. Stevenson, "Plugging the phishing hole: Legislation versus technology," Duke Law & Technology Review, vol. 2005, no. 0006, 2005. [Online]. Available: http://www.law.duke.edu/journals/dltr/articles/ 2005dltr0006.html
    • (2005) Duke Law & Technology Review , vol.2005 , Issue.6
    • Stevenson, R.L.B.1
  • 23
    • 72449173240 scopus 로고    scopus 로고
    • INTERNET FRAUD: Preventing and responding to phishing and spoofing scams
    • D. Whitlock, "INTERNET FRAUD: Preventing and responding to phishing and spoofing scams," New Hampshire Bar J., vol. 42, no. 2, pp. 30-33, 2008.
    • (2008) New Hampshire Bar J , vol.42 , Issue.2 , pp. 30-33
    • Whitlock, D.1
  • 25
    • 72449176235 scopus 로고    scopus 로고
    • Institut Euréacom EURECOM, Sophia Antipolis, France, Research Report RR-03-081, Online, Available
    • F. Pouget, M. Dacier, and H. Debar, "Honeypot, honeynet, honeytoken: Terminological issues," Institut Euréacom (EURECOM), Sophia Antipolis, France, Research Report RR-03-081, 2003. [Online]. Available: http://www.eurecom.fr/util/publidownload.fr.htm?id=1275
    • (2003) Honeypot, honeynet, honeytoken: Terminological issues
    • Pouget, F.1    Dacier, M.2    Debar, H.3
  • 26
    • 33845926633 scopus 로고    scopus 로고
    • PHONEY: Mimicking user response to detect phishing attacks
    • IEEE Computer Society
    • M. Chandrasekaran, R. Chinchani, and S. Upadhyaya, "PHONEY: Mimicking user response to detect phishing attacks," in Proc. WoWMoM'2006. IEEE Computer Society, 2006, pp. 668-672.
    • (2006) Proc. WoWMoM'2006 , pp. 668-672
    • Chandrasekaran, M.1    Chinchani, R.2    Upadhyaya, S.3
  • 27
    • 39749133014 scopus 로고    scopus 로고
    • Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks
    • IEEE Computer Society
    • C. M. McRae and R. B. Vaughn, "Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks," in Proc. HICSS'2007. IEEE Computer Society, 2007, p. 270c.
    • (2007) Proc. HICSS'2007
    • McRae, C.M.1    Vaughn, R.B.2
  • 28
    • 60649094724 scopus 로고    scopus 로고
    • Anti-phishing in offense and defense
    • IEEE Computer Society
    • C. Yue and H. Wang, "Anti-phishing in offense and defense," in Proc. ACSAC2008. IEEE Computer Society, 2008, pp. 345-354.
    • (2008) Proc. ACSAC2008 , pp. 345-354
    • Yue, C.1    Wang, H.2
  • 29
    • 35348895913 scopus 로고    scopus 로고
    • Phishing phishers - observing and tracing organized cybercrime
    • IEEE Computer Society
    • D. Birk, S. Gajek, F Grobert, and A.-R. Sadeghi, "Phishing phishers - observing and tracing organized cybercrime," in Proc. ICIMP'2007. IEEE Computer Society, 2007.
    • (2007) Proc. ICIMP'2007
    • Birk, D.1    Gajek, S.2    Grobert, F.3    Sadeghi, A.-R.4
  • 30
    • 45949097266 scopus 로고    scopus 로고
    • A forensic framework for tracing phishers
    • The Future of Identity in the Information Society, Springer
    • S. Gajek and A. Sadeghi, "A forensic framework for tracing phishers," in The Future of Identity in the Information Society, ser. IFIP International Federation for Information Processing, vol. 262. Springer, 2008, pp. 23-35.
    • (2008) ser. IFIP International Federation for Information Processing , vol.262 , pp. 23-35
    • Gajek, S.1    Sadeghi, A.2
  • 31
    • 72449201401 scopus 로고    scopus 로고
    • Server load balancing architectures
    • Online, Available
    • G. Roth, "Server load balancing architectures, Part 1: Transport-level load balancing," 2008. [Online]. Available: http://www.javaworld.com/javaworld/jw-10-2008/jw-10-load-balancing-1.html
    • (2008) Transport-level load balancing , Issue.PART 1
    • Roth, G.1
  • 32
    • 84975742583 scopus 로고    scopus 로고
    • Server load balancing architectures
    • Online, Available
    • -, "Server load balancing architectures, Part 2: Application-level load balancing," 2008. [Online]. Available: http://www.javaworld.com/ javaworld/jw-10-2008/jw-10-load-balancing-2.html
    • (2008) Application-level load balancing , Issue.PART 2
    • Roth, G.1
  • 33
    • 48249109486 scopus 로고    scopus 로고
    • Protecting financial institutions from brute-force attacks
    • Proc. IFIP SEC2008, Springer
    • C. Herley and D. Florêncio, "Protecting financial institutions from brute-force attacks," in Proc. IFIP SEC2008, ser. IFIP International Federation for Information Processing, vol. 278. Springer, 2008, pp. 681-685.
    • (2008) ser. IFIP International Federation for Information Processing , vol.278 , pp. 681-685
    • Herley, C.1    Florêncio, D.2
  • 34
    • 72449146604 scopus 로고    scopus 로고
    • RSA Security Inc, Online, Available
    • SM: Advanced external threats protection service," 2008. [Online]. Available: http://www.rsa.com/products/consumer/datasheets/9933FRAGOV-DS-1208.pdf
    • (2008) SM: Advanced external threats protection service
  • 36
    • 24644432751 scopus 로고    scopus 로고
    • Online, Available
    • R. M. Smith, "The web bug FAQ," 1999. [Online]. Available: http://w2.eff.org/Privacy/Marketing/web-bug.html
    • (1999) The web bug FAQ
    • Smith, R.M.1
  • 37
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Comm. ACM, vol. 47, no. 2, pp. 57-60, 2004.
    • (2004) Comm. ACM , vol.47 , Issue.2 , pp. 57-60
    • von Ahn, L.1    Blum, M.2    Langford, J.3
  • 38
    • 0041431049 scopus 로고    scopus 로고
    • Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA
    • IEEE Computer Society
    • G. Mori and J. Malik, "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA," in Proc. CVPR'2003, vol. 1. IEEE Computer Society, 2003, pp. 134-141.
    • (2003) Proc. CVPR'2003 , vol.1 , pp. 134-141
    • Mori, G.1    Malik, J.2
  • 39
    • 48649084325 scopus 로고    scopus 로고
    • Breaking visual CAPTCHAs with naïve pattern recognition algorithms
    • IEEE Computer Society
    • J. Yan and A. S. E. Ahmad, "Breaking visual CAPTCHAs with naïve pattern recognition algorithms," in Proc. ACSAC'2007. IEEE Computer Society, 2007, pp. 279-291.
    • (2007) Proc. ACSAC'2007 , pp. 279-291
    • Yan, J.1    Ahmad, A.S.E.2
  • 40
    • 66249097513 scopus 로고    scopus 로고
    • A low-cost attack on a Microsoft CAPTCHA
    • -, "A low-cost attack on a Microsoft CAPTCHA," in Proc. ACM CCS'2008, 2008, pp. 543-554.
    • (2008) Proc. ACM CCS'2008 , pp. 543-554
    • Yan, J.1    Ahmad, A.S.E.2
  • 42
    • 84959317935 scopus 로고    scopus 로고
    • aiCaptcha: Using AI to beat CAPTCHA and post comment spam
    • Online, Available
    • C. Chesnut, "aiCaptcha: Using AI to beat CAPTCHA and post comment spam," 2005. [Online]. Available: http://www.brains-n-brawn.com/aiCaptcha
    • (2005)
    • Chesnut, C.1
  • 43
    • 72449175086 scopus 로고    scopus 로고
    • PC stripper helps spam to spread,
    • Online, Available
    • BBC News, "PC stripper helps spam to spread," 2007. [Online]. Available: http://news.bbc.co.uk/2/hi/technology/7067962.stm
    • (2007) BBC News
  • 44
    • 77953898602 scopus 로고    scopus 로고
    • Examining the impact of website take-down on phishing
    • ACM
    • T. Moore and R. Clayton, "Examining the impact of website take-down on phishing," in Proc. APWG eCRS'2007. ACM, 2007, pp. 1-13.
    • (2007) Proc. APWG eCRS'2007 , pp. 1-13
    • Moore, T.1    Clayton, R.2
  • 45
    • 72449143000 scopus 로고    scopus 로고
    • Outsourcing information technology and the insider threat
    • Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Air University, USA, Online, Available
    • V. L. Caruso, "Outsourcing information technology and the insider threat," AFIT/GIR/ENG/03-01, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Air University, USA, 2003. [Online]. Available: http://handle.dtic.mil/100.2/ADA415113
    • (2003) AFIT/GIR/ENG/03-01
    • Caruso, V.L.1
  • 46
    • 72449186916 scopus 로고    scopus 로고
    • IT-Online, World-first SMS banking scam exposes weaknesses, Web page, July 2009. [Online]. Available: http://www.it-online.co.za/content/ view/1092105/142/
    • IT-Online, "World-first SMS banking scam exposes weaknesses," Web page, July 2009. [Online]. Available: http://www.it-online.co.za/content/ view/1092105/142/
  • 47
    • 72449203010 scopus 로고    scopus 로고
    • A profitless endeavor: Phishing as tragedy of the commons
    • ACM
    • C. Herley and D. Florêncio, "A profitless endeavor: Phishing as tragedy of the commons," in Proc. NSPW'2008. ACM, 2008, pp. 59-70.
    • (2008) Proc. NSPW'2008 , pp. 59-70
    • Herley, C.1    Florêncio, D.2
  • 48
    • 34548344520 scopus 로고    scopus 로고
    • Phishing activity trends report
    • Anti-Phishing Working Group, Online, Available
    • Anti-Phishing Working Group, "Phishing activity trends report, 2nd half/2008," 2009. [Online]. Available: http://www.antiphishing.org/reports/ apwg-report-H2-2008.pdf
    • (2009) 2nd half/2008
  • 49
    • 72449161457 scopus 로고    scopus 로고
    • Online, Available
    • Deutsche Bank, "Deutsche Bank at a glance," 2008. [Online]. Available: http://www.db.com/presse/en/download/DB-at-a-glance-2008.pdf
    • (2008) Deutsche Bank at a glance
    • Bank, D.1
  • 50
    • 72449199996 scopus 로고    scopus 로고
    • Online, Available
    • Sparkasse Heidelberg, "Online-banking: Increased security with iTAN," 2006. [Online]. Available: http://www.sparkasse-heidelberg.com/spk- hden/pk/banking/itan.html
    • (2006) Online-banking: Increased security with iTAN
  • 51
    • 72449131746 scopus 로고    scopus 로고
    • chipTAN: Listen werden überflüssig,
    • Online, Available
    • Berliner Sparkasse, "chipTAN: Listen werden überflüssig, " 2005. [Online]. Available: http://www.berliner-sparkasse.de/anzeigen.php? tpl=privatkunden/konten-karten/online-banking/tan-generator.html
    • (2005)
  • 52
    • 72449128418 scopus 로고    scopus 로고
    • Volksbank Solling eG, Sm@rt-TAN-plus, 2009. [Online]. Available: http://www.volksbank-solling.de/flycms/de/html/913/-/Smart+TAN+plus. html
    • Volksbank Solling eG, "Sm@rt-TAN-plus," 2009. [Online]. Available: http://www.volksbank-solling.de/flycms/de/html/913/-/Smart+TAN+plus. html
  • 53
    • 72449121723 scopus 로고    scopus 로고
    • New banking security system iTAN not as secure as claimed
    • RedTeam Pentesting GmbH, Online, Available
    • RedTeam Pentesting GmbH, "New banking security system iTAN not as secure as claimed," Advisory rt-sa-2005-014, 2005. [Online]. Available: http://www.redteam-pentesting.de/advisories/rt-sa-2005-014
    • (2005) Advisory rt-sa-2005-014
  • 54
    • 72449144483 scopus 로고    scopus 로고
    • A-I3 Pressemeldung
    • Arbeitsgruppe Identitätsschutz im Internet, Update, Online, Available
    • Arbeitsgruppe Identitätsschutz im Internet, "A-I3 Pressemeldung: iTAN nur in Verbindung mit SSL sicher (Update)," 2005. [Online]. Available: https://www.a-i3.org/content/view/411/28
    • (2005) iTAN nur in Verbindung mit SSL sicher


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.