skip to main content
10.1145/3055186.3055188acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Detecting Phishing Websites using Automation of Human Behavior

Published: 02 April 2017 Publication History

Abstract

In this paper, we propose a technique to detect phishing attacks based on behavior of human when exposed to fake website. Some online users submit fake credentials to the login page before submitting their actual credentials. He/She observes the login status of the resulting page to check whether the website is fake or legitimate. We automate the same behavior with our application (FeedPhish) which feeds fake values into login page. If the web page logs in successfully, it is classified as phishing otherwise it undergoes further heuristic filtering. If the suspicious site passes through all heuristic filters then the website is classified as a legitimate site. As per the experimentation results, our application has achieved a true positive rate of 97.61%, true negative rate of 94.37% and overall accuracy of 96.38%. Our application neither demands third party services nor prior knowledge like web history, whitelist or blacklist of URLS. It is able to detect not only zero-day phishing attacks but also detects phishing sites which are hosted on compromised domains.

References

[1]
HTTrack Website Copier - Free Software Offline Browser (GNU GPL). https://www.httrack.com/.
[2]
Jsoup Java HTML Parser, with best of DOM, CSS, and jquery. https://jsoup.org/.
[3]
Selenium. http://docs.seleniumhq.org/download/.
[4]
Wget - GNU Project - Free Software Foundation. https://www.gnu.org/software/wget/.
[5]
Phishing attack trends reports, 4th quarter 2015. http://docs.apwg.org/reports/apwg_trends_report_q4_2015.pdf, 2015. Accessed: 2016-06-01.
[6]
APWG. Phishing attack trends reports, first quarter 2016. http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf, 2016. Accessed: 2016-06-01.
[7]
Y. Cao, W. Han, and Y. Le. Anti-phishing based on automated individual white-list. In Proceedings of the 4th ACM workshop on Digital identity management, pages 51--60. ACM, 2008.
[8]
K. L. Chiew, E. H. Chang, W. K. Tiong, et al. Utilisation of website logo for phishing detection. Computers & Security, 54:16--26, 2015.
[9]
N. Chou, R. Ledesma, Y. Teraguchi, J. C. Mitchell, et al. Client-side defense against web-based identity theft. In NDSS, 2004.
[10]
A. Y. Fu, L. Wenyin, and X. Deng. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (emd). IEEE transactions on dependable and secure computing, 3(4):301--311, 2006.
[11]
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode, pages 1--8. ACM, 2007.
[12]
M. Hara, A. Yamada, and Y. Miyake. Visual similarity-based phishing detection without victim site information. In Computational Intelligence in Cyber Security, 2009. CICS'09. IEEE Symposium on, pages 30--36. IEEE, 2009.
[13]
M. He, S.-J. Horng, P. Fan, M. K. Khan, R.-S. Run, J.-L. Lai, R.-J. Chen, and A. Sutanto. An efficient phishing webpage detector. Expert Systems with Applications, 38(10):12018--12027, 2011.
[14]
Y. Joshi, S. Saklikar, D. Das, and S. Saha. Phishguard: A browser plug-in for protection from phishing. In Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008. 2nd International Conference on, pages 1--6. IEEE, 2008.
[15]
H. Kazemian and S. Ahmed. Comparisons of machine learning techniques for detecting malicious webpages. Expert Systems with Applications, 42(3):1166 -- 1177, 2015.
[16]
P. Mensah, G. Blanc, K. Okada, D. Miyamoto, and Y. Kadobayashi. Ajna: Anti-phishing js-based visual analysis, to mitigate users' excessive trust in ssl/tls.
[17]
M. Moghimi and A. Y. Varjani. New rule-based phishing detection method. Expert systems with applications, 53:231--242, 2016.
[18]
Y. Pan and X. Ding. Anomaly based web phishing page detection. In Proceedings - Annual Computer Security Applications Conference, ACSAC, volume 6, pages 381--392, 2006.
[19]
P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta. Phishnet: Predictive blacklisting to detect phishing attacks. In INFOCOM, 2010 Proceedings IEEE, pages 1--5. IEEE, 2010.
[20]
G. Ramesh, I. Krishnamurthi, and K. S. S. Kumar. An efficacious method for detecting phishing webpages through target domain identification. Decision Support Systems, 61:12 -- 22, 2014.
[21]
R. S. Rao and S. T. Ali. A computer vision technique to detect phishing attacks. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, pages 596--601. IEEE, 2015.
[22]
R. S. Rao. and S. T. Ali. Phishshield: A desktop application to detect phishing webpages through heuristic approach. Procedia Computer Science, 54:147--156, 2015.
[23]
H. Shahriar and M. Zulkernine. Trustworthiness testing of phishing websites: A behavior model-based approach. Future Generation Computer Systems, 28(8):1258--1271, 2012.
[24]
C. L. Tan, K. L. Chiew, et al. Phishing website detection using url-assisted brand name weighting system. In 2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), pages 054--059. IEEE, 2014.
[25]
C. L. Tan, K. L. Chiew, K. Wong, and S. N. Sze. Phishwho: Phishing webpage detection via identity keywords extraction and target domain name finder. Decision Support Systems, 88:18 -- 27, 2016.
[26]
T. Van Goethem, F. Piessens, W. Joosen, and N. Nikiforakis. Clubbing seals: Exploring the ecosystem of third-party security seals. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 918--929. ACM, 2014.
[27]
G. Varshney, M. Misra, and P. K. Atrey. A phish detector using lightweight search features. Computers & Security, 62:213 -- 228, 2016.
[28]
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng. Detection of phishing webpages based on visual similarity. In Special interest tracks and posters of the 14th international conference on World Wide Web, pages 1060--1061. ACM, 2005.
[29]
G. Xiang, J. Hong, C. P. Rose, and L. Cranor. Cantina
[30]
: A feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security (TISSEC), 14(2):21, 2011.
[31]
J. Zhang, P. A. Porras, and J. Ullrich. Highly predictive blacklisting. In USENIX Security Symposium, pages 107--122, 2008.
[32]
Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. In Proceedings of the 16th international conference on World Wide Web, pages 639--648. ACM, 2007.

Cited By

View all

Index Terms

  1. Detecting Phishing Websites using Automation of Human Behavior

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CPSS '17: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security
    April 2017
    120 pages
    ISBN:9781450349567
    DOI:10.1145/3055186
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anti-phishing
    2. automation
    3. heuristics
    4. phishing
    5. selenium

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '17
    Sponsor:

    Acceptance Rates

    CPSS '17 Paper Acceptance Rate 10 of 35 submissions, 29%;
    Overall Acceptance Rate 43 of 135 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)50
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media