Waste Flooding: Ferramenta para Retaliação de Phishing
Abstract
Phishing is a well known attack technique but it is still a growing threat. The Internet rising popularity potentialized phishing possibilities giving attackers a group of new instruments and allowing closer contact to its focus, the user. By applying social engineering methods, phishing thrives on misinformation. That's why, current main phishing response methods focus only on educating users or blocking phishing attempts, without any response to derail already implemented attacks. These conditions may leave targeted users unprotected, as any leaked information can not be tracked to determine who suffered from phishing and compromised data can not be saved or easily detected. In this paper, we present and discuss a new response tool that aims to furtively retaliate by automatic detecting phishing forms and using them to clutter phishing databases.References
Aburrous, M. R., Hossain, A., Thabatah, F., and Dahal, K. (2008). Intelligent quality performance assessment for e-banking security using fuzzy logic. In Fifth International Conference on Information Technology: New Generations (itng 2008). IEEE.
APWG (2014). Global Phishing Report 2H 2014. Technical report.
Chiew, K. L., Yong, K. S. C., and Tan, C. L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106:1–20.
Cui, Q., Jourdan, G.-V., Bochmann, G. V., Couturier, R., and Onut, I.-V. (2017). Tracking Phishing Attacks Over Time. pages 667–676.
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. (2005). Social Phishing *. Technical report.
Kaspersky (2019). Phishing attacks more than doubled in 2018 to reach almost 500 million.
Khade, A. and Shinde, S. (2014). Detection of phishing websites using data mining techniques. International Journal of Engineering Research and Technology, 2(12).
Li, S. and Schmitz, R. (2009). A Novel Anti-Phishing Framework Based on Honeypots.
Mcrae, C. M., Vaughn, R. B., and Research, S. (2007). Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. Technical report.
Moore, T. and Clayton, R. (2007). Examining the Impact of Website Take-down on Phishing. Technical report.
Qabajeh, I., Thabtah, F., and Chiclana, F. (2018). A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Computer Science Review, 29:44– 55.
Symantec (2019). ISTR - Internet Security Threat Report Volume 24. Technical report,Symantec Corporation.
Williams, E. J., Hinds, J., and Joinson, A. N. (2018). Exploring susceptibility to phishing in the workplace.
APWG (2014). Global Phishing Report 2H 2014. Technical report.
Chiew, K. L., Yong, K. S. C., and Tan, C. L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106:1–20.
Cui, Q., Jourdan, G.-V., Bochmann, G. V., Couturier, R., and Onut, I.-V. (2017). Tracking Phishing Attacks Over Time. pages 667–676.
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. (2005). Social Phishing *. Technical report.
Kaspersky (2019). Phishing attacks more than doubled in 2018 to reach almost 500 million.
Khade, A. and Shinde, S. (2014). Detection of phishing websites using data mining techniques. International Journal of Engineering Research and Technology, 2(12).
Li, S. and Schmitz, R. (2009). A Novel Anti-Phishing Framework Based on Honeypots.
Mcrae, C. M., Vaughn, R. B., and Research, S. (2007). Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. Technical report.
Moore, T. and Clayton, R. (2007). Examining the Impact of Website Take-down on Phishing. Technical report.
Qabajeh, I., Thabtah, F., and Chiclana, F. (2018). A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Computer Science Review, 29:44– 55.
Symantec (2019). ISTR - Internet Security Threat Report Volume 24. Technical report,Symantec Corporation.
Williams, E. J., Hinds, J., and Joinson, A. N. (2018). Exploring susceptibility to phishing in the workplace.
Published
2019-09-02
How to Cite
LEITE, Cristoffer; GONDIM, João; BARRETO, Priscilla; ALCHIERI, Eduardo.
Waste Flooding: Ferramenta para Retaliação de Phishing. In: TOOLS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 27-34.
DOI: https://doi.org/10.5753/sbseg_estendido.2019.14001.
