论文标题
网络钓鱼URL检测:一种基于网络的方法可逃避
Phishing URL Detection: A Network-based Approach Robust to Evasion
论文作者
论文摘要
许多网络攻击始于传播网络钓鱼URL。单击这些网络钓鱼URL时,受害者的私人信息会泄漏给攻击者。已经提出了几种机器学习方法来检测网络钓鱼URL。然而,检测出逃避的网络钓鱼URL,即通过操纵模式假装良性的网络钓鱼URL仍然尚未探索。在许多情况下,攻击者i)重复使用网络钓鱼网页,因为制造完全全新的设定成本非平淡的费用,ii)优先托管不需要私人信息并且比其他公司便宜的公司更便宜,iii)更喜欢共享托管的成本效率,而iv)有时会使用良性域,IP地址,IP地址和URL String String Pattern of Rutance现有的探测方法。受这些行为特征的启发,我们提出了一种基于网络的推理方法,以准确检测具有合法模式的网络钓鱼URL,即逃避稳定。在网络方法中,即使在逃避之后,网络钓鱼URL仍将被确定为网络师,除非同时逃避网络中的大多数邻居。我们的方法始终在各种实验测试中表现出更好的检测性能,而不是最新方法,例如,对于我们的方法,对于最佳特征方法而言,我们的方法为0.89,而0.84。
Many cyberattacks start with disseminating phishing URLs. When clicking these phishing URLs, the victim's private information is leaked to the attacker. There have been proposed several machine learning methods to detect phishing URLs. However, it still remains under-explored to detect phishing URLs with evasion, i.e., phishing URLs that pretend to be benign by manipulating patterns. In many cases, the attacker i) reuses prepared phishing web pages because making a completely brand-new set costs non-trivial expenses, ii) prefers hosting companies that do not require private information and are cheaper than others, iii) prefers shared hosting for cost efficiency, and iv) sometimes uses benign domains, IP addresses, and URL string patterns to evade existing detection methods. Inspired by those behavioral characteristics, we present a network-based inference method to accurately detect phishing URLs camouflaged with legitimate patterns, i.e., robust to evasion. In the network approach, a phishing URL will be still identified as phishy even after evasion unless a majority of its neighbors in the network are evaded at the same time. Our method consistently shows better detection performance throughout various experimental tests than state-of-the-art methods, e.g., F-1 of 0.89 for our method vs. 0.84 for the best feature-based method.