论文标题

了解模仿统一资源定位者以利用网络钓鱼攻击的策略:一种机器学习方法

Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach

论文作者

Tharani, J. Samantha, Arachchilage, Nalin Asanka Gamagedara

论文摘要

网络钓鱼是一种社会工程攻击,目的是窃取用户数据,包括登录凭据和信用卡号,从而导致组织和个人的财务损失。当攻击者假装是一个受信任的实体,引诱受害者进入电子邮件中的链接或附件或在短信中的附件时,就会发生这种情况。网络钓鱼通常是通过社交网络通过电子邮件或短信启动的。先前的研究表明,仅通过查看URL可以识别网络钓鱼攻击。识别phishers用来模仿网络钓鱼URL的技术是一个充满挑战的问题。目前,我们对网络犯罪分子如何试图模仿合法的网址和感觉的知识和理解有限,以吸引人们单击链接。因此,本文研究了网络钓鱼URL(统一资源定位器)的特征选择,旨在探索Phishers对模拟URL采用的策略,这些URL显然可以欺骗人们单击链接。我们在网络钓鱼数据集上采用了机器学习(ML)中的信息增益(IG)和卡方特征选择方法。该数据集总共包含从5000个网络钓鱼中提取的48个功能,以及从2015年1月至2015年5月下载的5000个合法URL以及2017年5月至2017年6月。我们的结果表明,Phissique曾经有10种技术模仿,以模拟该技术,以操纵人类来点击链接。确定这些网络钓鱼URL操纵技术肯定会有助于教育个人和组织,并使他们免受网络钓鱼攻击的侵害。此外,这项研究的结果还将有助于开发防止网络钓鱼的防护工具,框架或浏览器插件。

Phishing is a type of social engineering attack with an intention to steal user data, including login credentials and credit card numbers, leading to financial losses for both organisations and individuals. It occurs when an attacker, pretending as a trusted entity, lure a victim into click on a link or attachment in an email, or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks can be identified just by looking at URLs. Identifying the techniques which are used by phishers to mimic a phishing URL is rather a challenging issue. At present, we have limited knowledge and understanding of how cybercriminals attempt to mimic URLs with the same look and feel of the legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (Uniform Resource Locators), aiming to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an Information Gain (IG) and Chi-Squared feature selection methods in Machine Learning (ML) on a phishing dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January to May 2015 and from May to June 2017. Our results revealed that there were 10 techniques that phishers used to mimic URLs to manipulate humans into clicking links. Identifying these phishing URL manipulation techniques would certainly help to educate individuals and organisations and keep them safe from phishing attacks. In addition, the findings of this research will also help develop anti-phishing tools, framework or browser plugins for phishing prevention.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源