SlideShare a Scribd company logo
1 of 10
Anti-Phishing
Approaches
Lifeng Hu
lh2342@columbia.edu
What is Phishing?
 An engineering attack
 An attempt to trick individuals into revealing personal
credentials (uname, passwd, credit card info, etc)
 Based on faked email and websites
 A threat for the internet users
 Damages
- 73 million US adults
received more than 50
phishing emails a year
- $2.8 billion loss a year
Phishing Methods
 Establish websites having similar interface/URL
as famous websites
 Establish cheating websites to get users’
personal information
 Establish transparent website between original
websites and users
 Send emails containing malicious URL
 Send emails containing embed malicious
flash/picture files to avoid text checking of anti-
phishing
False positive/negative rate of
Anti-Phishing Approaches
 False negative rate: the rate of phishing websites being
regarded as good in all phishing websites
 False positive rate: the rate of good websites being
regarded as phishing in all good websites
 So, the lower false rates are, the better Anti-Phishing
approach is
goodphish
phish
goodgood
good
pf
goodphish
phish
goodgood
good
pf
goodphish
phish
goodgood
good
pf
phishgood
good
phishphish
phish
nf
phishgood
good
phishphish
phish
nf
Anti-Phishing Approaches
for Specific Websites
 Typically, designed by website companies
 An example is Sitekey mechanism of
BankOfAmerica online
 Pro: False negative rate is low
False positive rate can be zero
 Con: Not applicable for phishing emails
Anti-Phishing Approaches
Based on Database
 Anti-phishing Firewall : Kaspersky
 Anti-phishing Toolbar : Netcraft
 All based on on-line database
 Toolbar can provide URL statistics data in advance
 Pro: Applicable for both websites and emails
False negative rate can be low
False positive rate is low
 Con: Need frequent updates
Relatively hard to implement
False negative rate increases if not up-to-date
Anti-Phishing Approaches
Based on Content
 PILFER: email phishing detection based on machine-learning combining 10
filters:
- IP based URL: 192.168.0.1/paypal.cgi?fix=account
- Domain age from whois.net
- Non-matching URL: <a href=“phishingsite.com"> paypal.com</a>
- HTML email : hidden URLs
- Malicious JavaScript
- <More>…
 Pro: Practically, false positive and negative rate are relative low
Machine learning methods make it possible to improve accuracy
No constant update is needed
 Con: Still need updates on training data and filters to adapt new styles of
phishing emails
Network cost is a problem
Anti-Phishing Approaches
Based on Content (cont.)
 CANTINA: phishing website detection based on TF-IDF weight
- TF: the number of times a given term appears in a specific document
- IDF: a measure of the general importance of the term in all documents
- TF-IDF = TF/IDF, specifies term with frequency in a given document
- Search five top TF-IDF words of current web page in search engine such as
Google
- Current web page should be in top N (30) search results to be legitimate
 CANTINA also uses filters similar to PILFER to decrease false positive
 Pro: False positive and negative rate are very low
No constant update is needed
Search engine ranking is relative hard to cheat
 Con: Network cost is a problem
Too many phishing website searches may affect phishing websites’
ranking
Summary of mentioned
Anti-Phishing Approaches
Anti-Phishing Approaches False Positive False Negative
Implement
Effort
Adaptation
Update
Cycle
For Specific Websites Zero Low Easy Specific Website None
Firewall Based on Database Low Medium Medium
General
Web/Email
Very Frequently
Toolbar Based on Database Low Low Hard
General
Web/Email
Very Frequently
PILFER Low Low Medium General Email Sometimes
CANTINA Very Low Low Medium
General
Websites
Few
Thanks!

More Related Content

Similar to Lifeng hu anti_phishing

Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spammingKavis Pandey
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdfvinayakjadhav94
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101PECB
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxMaheshDhope1
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection schemeMussavir Shaikh
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
 
Cyber Aware Presentation- Penny Austin.pptx
Cyber Aware Presentation- Penny Austin.pptxCyber Aware Presentation- Penny Austin.pptx
Cyber Aware Presentation- Penny Austin.pptxNebojaIli
 

Similar to Lifeng hu anti_phishing (20)

Shiv seminar final
Shiv seminar finalShiv seminar final
Shiv seminar final
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
Phishing
PhishingPhishing
Phishing
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Cyber Aware Presentation- Penny Austin.pptx
Cyber Aware Presentation- Penny Austin.pptxCyber Aware Presentation- Penny Austin.pptx
Cyber Aware Presentation- Penny Austin.pptx
 

Recently uploaded

Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Lifeng hu anti_phishing

  • 2. What is Phishing?  An engineering attack  An attempt to trick individuals into revealing personal credentials (uname, passwd, credit card info, etc)  Based on faked email and websites  A threat for the internet users  Damages - 73 million US adults received more than 50 phishing emails a year - $2.8 billion loss a year
  • 3. Phishing Methods  Establish websites having similar interface/URL as famous websites  Establish cheating websites to get users’ personal information  Establish transparent website between original websites and users  Send emails containing malicious URL  Send emails containing embed malicious flash/picture files to avoid text checking of anti- phishing
  • 4. False positive/negative rate of Anti-Phishing Approaches  False negative rate: the rate of phishing websites being regarded as good in all phishing websites  False positive rate: the rate of good websites being regarded as phishing in all good websites  So, the lower false rates are, the better Anti-Phishing approach is goodphish phish goodgood good pf goodphish phish goodgood good pf goodphish phish goodgood good pf phishgood good phishphish phish nf phishgood good phishphish phish nf
  • 5. Anti-Phishing Approaches for Specific Websites  Typically, designed by website companies  An example is Sitekey mechanism of BankOfAmerica online  Pro: False negative rate is low False positive rate can be zero  Con: Not applicable for phishing emails
  • 6. Anti-Phishing Approaches Based on Database  Anti-phishing Firewall : Kaspersky  Anti-phishing Toolbar : Netcraft  All based on on-line database  Toolbar can provide URL statistics data in advance  Pro: Applicable for both websites and emails False negative rate can be low False positive rate is low  Con: Need frequent updates Relatively hard to implement False negative rate increases if not up-to-date
  • 7. Anti-Phishing Approaches Based on Content  PILFER: email phishing detection based on machine-learning combining 10 filters: - IP based URL: 192.168.0.1/paypal.cgi?fix=account - Domain age from whois.net - Non-matching URL: <a href=“phishingsite.com"> paypal.com</a> - HTML email : hidden URLs - Malicious JavaScript - <More>…  Pro: Practically, false positive and negative rate are relative low Machine learning methods make it possible to improve accuracy No constant update is needed  Con: Still need updates on training data and filters to adapt new styles of phishing emails Network cost is a problem
  • 8. Anti-Phishing Approaches Based on Content (cont.)  CANTINA: phishing website detection based on TF-IDF weight - TF: the number of times a given term appears in a specific document - IDF: a measure of the general importance of the term in all documents - TF-IDF = TF/IDF, specifies term with frequency in a given document - Search five top TF-IDF words of current web page in search engine such as Google - Current web page should be in top N (30) search results to be legitimate  CANTINA also uses filters similar to PILFER to decrease false positive  Pro: False positive and negative rate are very low No constant update is needed Search engine ranking is relative hard to cheat  Con: Network cost is a problem Too many phishing website searches may affect phishing websites’ ranking
  • 9. Summary of mentioned Anti-Phishing Approaches Anti-Phishing Approaches False Positive False Negative Implement Effort Adaptation Update Cycle For Specific Websites Zero Low Easy Specific Website None Firewall Based on Database Low Medium Medium General Web/Email Very Frequently Toolbar Based on Database Low Low Hard General Web/Email Very Frequently PILFER Low Low Medium General Email Sometimes CANTINA Very Low Low Medium General Websites Few