1st Workshop on Emulation Tools, Methodology and Techniques

Research Article

PhishCage: Reproduction of Fraudulent Websites in the Emulated Internet

  • @INPROCEEDINGS{10.4108/icst.simutools.2013.251707,
        author={Daisuke Miyamoto and Yuzo Taenaka and Toshiyuki Miyachi and Hiroaki Hazeyama},
        title={PhishCage: Reproduction of Fraudulent Websites in the Emulated Internet},
        proceedings={1st Workshop on Emulation Tools, Methodology and Techniques},
        publisher={ACM},
        proceedings_a={EMUTOOLS WORKSHOP},
        year={2013},
        month={7},
        keywords={phishing detection testbed emulation},
        doi={10.4108/icst.simutools.2013.251707}
    }
    
  • Daisuke Miyamoto
    Yuzo Taenaka
    Toshiyuki Miyachi
    Hiroaki Hazeyama
    Year: 2013
    PhishCage: Reproduction of Fraudulent Websites in the Emulated Internet
    EMUTOOLS WORKSHOP
    ICST
    DOI: 10.4108/icst.simutools.2013.251707
Daisuke Miyamoto1,*, Yuzo Taenaka1, Toshiyuki Miyachi2, Hiroaki Hazeyama3
  • 1: The University of Tokyo
  • 2: National Institute of Information and Communications Technology
  • 3: Nara Institute of Science and Technology
*Contact email: daisu-mi@nc.u-tokyo.ac.jp

Abstract

This paper introduces PhishCage, an experimental infrastructure for phishing detection systems. Due to the short life time of phishing sites, comparative study of effectiveness, especially universality, among the detection systems is difficult. Our key idea is developing a testbed in which preserved phishing sites can be browsed as if they existed in the wild. According to our survey for phishing detection systems, this paper defines the requirements for the testbed, and designs PhishCage to meet with the requirements. The experiment of PhishCage demonstrates our mapping algorithm for 121 phishing sites into the emulated Japanese Internet topology. We confirm that phishing detection systems can obtain the realistic IP address and autonomous system number of the phishing sites in PhishCage, and few modifications enable the systems to work as if they are in the real Internet. With regard to the experimental results, we analyze the limitation of PhishCage, and finally discuss the feasibility of our emulation technique.