Abstract
Recently, Phishing is a significant security threat to users and has been easy and effective way for trickery and deception on the internet. Phishing is an attempt to acquire our information as well as financial information without user’s knowledge by making similar kind of website or sending e-mails to users. Some of the widely available and used phishing detection techniques include whitelisting, blacklisting, and heuristics. But, absolute and perfect anti-phishing solutions and techniques are hard to fine due to a variability of phishing site domain. This paper aims to collect and filter out phishing suspicious URLs before determine phishing sites using Spamtrap system which is a honeypot used to collect spam e-mail. Spam e-mail usually contain phishing site URLs, so we can collect phishing site URLs from spam e-mail of spamtrap system. After collect URLs that can be phishing sites, many kind of phishing site detection algorithm can be used in our paper.
This research was supported by the KCC(Korea Communications Commission), Korea, under the R&D program supervised by the KCA(Korea Communications Agency)"
(KCA-2012-12-912-06-003).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
APWG, Global Phishing Survey : Trends and Domain Name Use in 1H 2011 (January-June 2011)
Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol. 6771, pp. 311–320. Springer, Heidelberg (2011)
Zhang, J., Ou, Y., Li, D., Xin, Y.: A Prior-based Transfer Learning Method for the Phishing Detection. Journal of Networks 7(8) (August 2012)
OpenDNS Phishtank (2011), http://www.phishtank.com/
Google, Google Safe Browsing API Developer’s Guide (v2) (2009), http://code.google.com/intl/zh-CN/apis/safebrowsing/developers_guide_v2.html
Xiang, G., Hong, J.I.: A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In: International Conference on World Wide Web (WWW) (2009)
Jeun, I., Lee, Y., Won, D.: A Practical Study on Advanced Persistent Threats. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech, CA, CES3 2012. CCIS, vol. 339, pp. 144–152. Springer, Heidelberg (2012)
Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: The 16th International Conference on World Wide Web (WWW 2007) (2007)
Cordero, A., Blain, T.: Catching Phish: Detecting Phishing Attacks From Rendered Website Images (2006)
Alkhozae, M.G., Maratfi, O.A.: Phishing Websites Detection based on Phishing Characteristics in the Webpage Source Code. International Journal of Information and Communication Technology Research (2011)
KISA, http://www.krecert.or.kr
Kidra, E., Kruegel, C.: Protecting Users against Phishing Attacks. The Computer Journal 49 (2006)
Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 20–39. Springer, Heidelberg (2007)
Prakash, P., et al.: PhishNet: Predictive Blacklisting to Detect Phishing Attacks. In: IEEE INFOCOM (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeun, I., Lee, Y., Won, D. (2013). Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_89
Download citation
DOI: https://doi.org/10.1007/978-3-642-38027-3_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38026-6
Online ISBN: 978-3-642-38027-3
eBook Packages: Computer ScienceComputer Science (R0)