PhishTrack - Dynamical Blacklist Evolution

碩士 === 國立臺灣大學 === 電機工程學研究所 === 102 === With time moving on, the technologies used in Phishing area is evolved as well. Owing to the updating mechanism and matching process used in static blacklist, it is hard to protect network users in time with only static blacklist approach. Many rising Phishing...

Full description

Bibliographic Details
Main Authors: Kuei-Ching Lee, 李奎慶
Other Authors: Hsin-Hsi Chen
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/85126810610627190366
id ndltd-TW-102NTU05442072
record_format oai_dc
spelling ndltd-TW-102NTU054420722016-03-09T04:24:22Z http://ndltd.ncl.edu.tw/handle/85126810610627190366 PhishTrack - Dynamical Blacklist Evolution 網路釣魚黑名單之動態更新研究 Kuei-Ching Lee 李奎慶 碩士 國立臺灣大學 電機工程學研究所 102 With time moving on, the technologies used in Phishing area is evolved as well. Owing to the updating mechanism and matching process used in static blacklist, it is hard to protect network users in time with only static blacklist approach. Many rising Phishing use toolkit to change the appearance of URLs to escape the detection from static blacklist with exactly matching. So we need more quickly and efficient ways to update the blacklist to adapt the evolution of Phishing and provide network users more powerful and prompt protection. Pawan Prakash et al. (2010) propose a PhishNet system. It does cluster training on known Phishing URL set in advance and propose five Heuristic approaches to replace TLD, Hostname, Target Page, Query String and Brand Name of Phishing URLs to discover more unknown Phishing URLs. Therefore the blacklist can be updated and enlarge the protection scope. In our research, we implement the five Heuristic approaches proposed in PhishNet as five components in our system, and proposed two more components originated in the observation of Phishing behaviors to form PhishTrack system proposed in this thesis. Phishing history started in early 1987 and the word "Phishing" is used in 1996 to address the focus on Phishing attacks, but the behavior and the nature of luring network users for their privacy information are not changed. From our research, we observe large quantity of Phishing URLs from blacklist of PhishTank and find out that 46% of them have URL redirection. From one point of view, that avoids the detection the Phishing''s behavior from blacklist. From another point of view, the ultimate goal of Phishing is to cheat the personal information of network users. Therefore, it must provide a form to users for them to fill in and submit information. According to our analysis, the submission will bring users to another page which requires more detail information to fill in. From the above discussion, we develop another two dynamic components J1-J2. Based on our experiments, J1-J2 can save the time required in H1-H5 for early stage on Cluster training. In addition,J1-J2 perform well on discovering more unknown Phishing URLs than H1-H5。 Hsin-Hsi Chen 陳信希 2014 學位論文 ; thesis 56 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電機工程學研究所 === 102 === With time moving on, the technologies used in Phishing area is evolved as well. Owing to the updating mechanism and matching process used in static blacklist, it is hard to protect network users in time with only static blacklist approach. Many rising Phishing use toolkit to change the appearance of URLs to escape the detection from static blacklist with exactly matching. So we need more quickly and efficient ways to update the blacklist to adapt the evolution of Phishing and provide network users more powerful and prompt protection. Pawan Prakash et al. (2010) propose a PhishNet system. It does cluster training on known Phishing URL set in advance and propose five Heuristic approaches to replace TLD, Hostname, Target Page, Query String and Brand Name of Phishing URLs to discover more unknown Phishing URLs. Therefore the blacklist can be updated and enlarge the protection scope. In our research, we implement the five Heuristic approaches proposed in PhishNet as five components in our system, and proposed two more components originated in the observation of Phishing behaviors to form PhishTrack system proposed in this thesis. Phishing history started in early 1987 and the word "Phishing" is used in 1996 to address the focus on Phishing attacks, but the behavior and the nature of luring network users for their privacy information are not changed. From our research, we observe large quantity of Phishing URLs from blacklist of PhishTank and find out that 46% of them have URL redirection. From one point of view, that avoids the detection the Phishing''s behavior from blacklist. From another point of view, the ultimate goal of Phishing is to cheat the personal information of network users. Therefore, it must provide a form to users for them to fill in and submit information. According to our analysis, the submission will bring users to another page which requires more detail information to fill in. From the above discussion, we develop another two dynamic components J1-J2. Based on our experiments, J1-J2 can save the time required in H1-H5 for early stage on Cluster training. In addition,J1-J2 perform well on discovering more unknown Phishing URLs than H1-H5。
author2 Hsin-Hsi Chen
author_facet Hsin-Hsi Chen
Kuei-Ching Lee
李奎慶
author Kuei-Ching Lee
李奎慶
spellingShingle Kuei-Ching Lee
李奎慶
PhishTrack - Dynamical Blacklist Evolution
author_sort Kuei-Ching Lee
title PhishTrack - Dynamical Blacklist Evolution
title_short PhishTrack - Dynamical Blacklist Evolution
title_full PhishTrack - Dynamical Blacklist Evolution
title_fullStr PhishTrack - Dynamical Blacklist Evolution
title_full_unstemmed PhishTrack - Dynamical Blacklist Evolution
title_sort phishtrack - dynamical blacklist evolution
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/85126810610627190366
work_keys_str_mv AT kueichinglee phishtrackdynamicalblacklistevolution
AT lǐkuíqìng phishtrackdynamicalblacklistevolution
AT kueichinglee wǎnglùdiàoyúhēimíngdānzhīdòngtàigèngxīnyánjiū
AT lǐkuíqìng wǎnglùdiàoyúhēimíngdānzhīdòngtàigèngxīnyánjiū
_version_ 1718201071928606720