Evolutionary study of phishing

Danesh Irani, Steve Webb, Jonathon T. Giffin, C. Pu
{"title":"Evolutionary study of phishing","authors":"Danesh Irani, Steve Webb, Jonathon T. Giffin, C. Pu","doi":"10.1109/ECRIME.2008.4696967","DOIUrl":null,"url":null,"abstract":"We study the evolution of phishing email messages in a corpus of over 380,000 phishing messages collected from August 2006 to December 2007. Our first result is a classification of phishing messages into two groups: flash attacks and non-flash attacks. Phishing message producers try to extend the usefulness of a phishing message by reusing the same message. In some cases this is done by sending a large volume of phishing messages over a short period of time (flash-attack) versus the same phishing message spread over a relatively longer period (nonflash attacks). Our second result is a corresponding classification of phishing features into two groups: transitory features and pervasive features. Features which are present in a few attacks and have a relatively short life span (transitory) are generally strong indicators of phishing, whereas features which are present in most of the attacks and have a long life span (pervasive) are generally weak selectors of phishing. One explanation of this is that phishing message producers limit the utility of transitory features in time (by avoiding them in future generations of phishing) and limit the utility of pervasive features by choosing features that also appear in legitimate messages. While useful in improving the understanding of phishing messages, our results also show the need for further study.","PeriodicalId":170338,"journal":{"name":"2008 eCrime Researchers Summit","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"51","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 eCrime Researchers Summit","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECRIME.2008.4696967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 51

Abstract

We study the evolution of phishing email messages in a corpus of over 380,000 phishing messages collected from August 2006 to December 2007. Our first result is a classification of phishing messages into two groups: flash attacks and non-flash attacks. Phishing message producers try to extend the usefulness of a phishing message by reusing the same message. In some cases this is done by sending a large volume of phishing messages over a short period of time (flash-attack) versus the same phishing message spread over a relatively longer period (nonflash attacks). Our second result is a corresponding classification of phishing features into two groups: transitory features and pervasive features. Features which are present in a few attacks and have a relatively short life span (transitory) are generally strong indicators of phishing, whereas features which are present in most of the attacks and have a long life span (pervasive) are generally weak selectors of phishing. One explanation of this is that phishing message producers limit the utility of transitory features in time (by avoiding them in future generations of phishing) and limit the utility of pervasive features by choosing features that also appear in legitimate messages. While useful in improving the understanding of phishing messages, our results also show the need for further study.
网络钓鱼的进化研究
我们研究了从2006年8月到2007年12月收集的超过38万条网络钓鱼邮件的语料库中网络钓鱼邮件的演变。我们的第一个结果是将网络钓鱼信息分为两组:flash攻击和非flash攻击。网络钓鱼消息生产者试图通过重用相同的消息来扩展网络钓鱼消息的有用性。在某些情况下,这是通过在短时间内发送大量的网络钓鱼消息(flash攻击),而不是在相对较长的时间内发送相同的网络钓鱼消息(非flash攻击)来实现的。我们的第二个结果是将网络钓鱼特征分为两组:短暂特征和普遍特征。在少数攻击中出现且生命周期相对较短(短暂)的特征通常是网络钓鱼的强指标,而在大多数攻击中出现且生命周期较长(普遍)的特征通常是网络钓鱼的弱选择。对此的一种解释是,网络钓鱼消息生产者在时间上限制了临时功能的效用(通过在未来几代的网络钓鱼中避免它们),并通过选择也出现在合法消息中的功能来限制普遍功能的效用。虽然有助于提高对网络钓鱼信息的理解,但我们的结果也表明需要进一步研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信