Skip to main content

Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System

  • Conference paper
Grid and Pervasive Computing (GPC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7861))

Included in the following conference series:

Abstract

Recently, Phishing is a significant security threat to users and has been easy and effective way for trickery and deception on the internet. Phishing is an attempt to acquire our information as well as financial information without user’s knowledge by making similar kind of website or sending e-mails to users. Some of the widely available and used phishing detection techniques include whitelisting, blacklisting, and heuristics. But, absolute and perfect anti-phishing solutions and techniques are hard to fine due to a variability of phishing site domain. This paper aims to collect and filter out phishing suspicious URLs before determine phishing sites using Spamtrap system which is a honeypot used to collect spam e-mail. Spam e-mail usually contain phishing site URLs, so we can collect phishing site URLs from spam e-mail of spamtrap system. After collect URLs that can be phishing sites, many kind of phishing site detection algorithm can be used in our paper.

This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency)"

(KCA-2012-12-912-06-003).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. APWG, Global Phishing Survey : Trends and Domain Name Use in 1H 2011 (January-June 2011)

    Google Scholar 

  2. Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol. 6771, pp. 311–320. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Zhang, J., Ou, Y., Li, D., Xin, Y.: A Prior-based Transfer Learning Method for the Phishing Detection. Journal of Networks 7(8) (August 2012)

    Google Scholar 

  4. OpenDNS Phishtank (2011), http://www.phishtank.com/

  5. Google, Google Safe Browsing API Developer’s Guide (v2) (2009), http://code.google.com/intl/zh-CN/apis/safebrowsing/developers_guide_v2.html

  6. Xiang, G., Hong, J.I.: A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In: International Conference on World Wide Web (WWW) (2009)

    Google Scholar 

  7. Jeun, I., Lee, Y., Won, D.: A Practical Study on Advanced Persistent Threats. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 144–152. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: The 16th International Conference on World Wide Web (WWW 2007) (2007)

    Google Scholar 

  9. Cordero, A., Blain, T.: Catching Phish: Detecting Phishing Attacks From Rendered Website Images (2006)

    Google Scholar 

  10. Alkhozae, M.G., Maratfi, O.A.: Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code. International Journal of Information and Communication Technology Research (2011)

    Google Scholar 

  11. KISA, http://www.krecert.or.kr

  12. Kidra, E., Kruegel, C.: Protecting Users against Phishing Attacks. The Computer Journal 49 (2006)

    Google Scholar 

  13. Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 20–39. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Prakash, P., et al.: PhishNet: Predictive Blacklisting to Detect Phishing Attacks. In: IEEE INFOCOM (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeun, I., Lee, Y., Won, D. (2013). Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_89

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38027-3_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38026-6

  • Online ISBN: 978-3-642-38027-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics