Movatterモバイル変換


[0]ホーム

URL:


CN103379111A - An intelligent defense system for phishing - Google Patents

An intelligent defense system for phishing
Download PDF

Info

Publication number
CN103379111A
CN103379111ACN2012101297567ACN201210129756ACN103379111ACN 103379111 ACN103379111 ACN 103379111ACN 2012101297567 ACN2012101297567 ACN 2012101297567ACN 201210129756 ACN201210129756 ACN 201210129756ACN 103379111 ACN103379111 ACN 103379111A
Authority
CN
China
Prior art keywords
phishing
user
website
url
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101297567A
Other languages
Chinese (zh)
Inventor
黄华军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University of Forestry and Technology
Original Assignee
Central South University of Forestry and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University of Forestry and TechnologyfiledCriticalCentral South University of Forestry and Technology
Priority to CN2012101297567ApriorityCriticalpatent/CN103379111A/en
Publication of CN103379111ApublicationCriticalpatent/CN103379111A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

Translated fromChinese

本发明涉及一种网络钓鱼智能防御系统,尤其是由用户行为识别模块、钓鱼网站轻量级智能检测引擎和网络钓鱼智能处理模块组成,用户行为识别模块是基于

Figure DSA00000709741400011
Bayes的用户行为识别算法;钓网站轻量级智能检测引擎模块由URL、交互性、网页噪声和站点Logo识别四层进行快速检测,包括融合多层特征的钓鱼URL在线检测算法、基于DOM树的网页服务器提交表单识别与过滤、网页噪声的钓鱼网站检测学习算法和基于站点Logo识别的钓鱼网站检测算法;对浏览器BHO对象规范,对检测出的钓鱼网站,先采用URL地址栏、状态栏、或者其他警示标志提醒用户的处理机制;当用户忽视警示机制,对用户输入的信息进行混淆保护的模块为网络用户提供智能、及时的网络钓鱼防御服务。The invention relates to a phishing intelligent defense system, in particular, it is composed of a user behavior identification module, a phishing website lightweight intelligent detection engine and a phishing intelligent processing module. The user behavior identification module is based on
Figure DSA00000709741400011
Bayes' user behavior recognition algorithm; phishing website lightweight intelligent detection engine module consists of four layers of URL, interactivity, webpage noise and site Logo recognition for rapid detection, including phishing URL online detection algorithm that integrates multi-layer features, DOM tree-based Form identification and filtering submitted by the web server, phishing website detection learning algorithm based on webpage noise, and phishing website detection algorithm based on site Logo identification; for browser BHO object specification, for detected phishing websites, first use the URL address bar, status bar, Or other warning signs to remind the user of the processing mechanism; when the user ignores the warning mechanism, the module that confuses and protects the information entered by the user provides intelligent and timely phishing defense services for network users.

Description

A kind of phishing intelligence system of defense
Technical field:
The present invention relates to a kind of phishing intelligence system of defense, a kind of protecting network user's phishing intelligence system of defense.
Background technology:
Phishing (phishing) is based on a kind of attack means of social engineering.It sends the duplicity information that comes from bank or other well-known mechanisms of claiming by spam, instant messenger, SMS or webpage sham publicity, be intended to lure the user to login and seem extremely real fake site, provide a kind of attack pattern of sensitive information (such as user name, password, account ID, ATM PIN code, credit card).
The phishing defence is the countermeasure techniques of phishing, can be divided into server end defence, user side defence and third party's defence.Server end defence refers to web site server end by other technologies, and such as digital watermark, digital finger-print, dynamic security skin (dynamic security skin), double verification protocol etc. prove the authenticity of website identity to the user.User side defence refers at user browser plug-in unit is installed, and detects prompting user or the input of protection user sensitive information etc. behind the fishing webpage.Third party defence comprises the URL blacklist strobe utility, fail-safe software manufacturer defense mechanism, public's protection mechanism of fishing Spam filtering, Third Party Authentication mechanism, browser provider etc.It is target that server end defends to protect the website identity reality, has increased the counterfeit cost of fisherman, produces from source containment fishing website, belongs to Initiative Defense; Both fishing websites of then occurring take defence are as target afterwards, and defense technique falls behind the counterfeit technology of fishing website, belongs to Passive Defence.Though the phishing defence has obtained considerable progress, the Initiative Defense technology exists allows the client user finally judge the website identity reality, and the Passive Defence technology is not installed the defective that plug-in unit just can't be defendd.
Summary of the invention:
For the problems referred to above, the purpose of this invention is to provide a kind of phishing intelligence system of defense, formed by user behavior identification module, fishing website lightweight Intelligent Measurement engine and phishing intelligent processing module, for the network user provides intelligence, timely phishing defence service.
For achieving the above object, the present invention takes following technical scheme:
1, user behavior identification module;
2, fishing website lightweight Intelligent Measurement engine;
3, phishing intelligent processing module;
The present invention is owing to take above technical scheme, and it has the following advantages:
1, based on
Figure BSA00000709741600011
The user behavior recognizer of Bayes;
2, the fishing website based on the webpage noise detects learning algorithm;
3, detect learning algorithm based on website Logo identification fishing website.
Embodiment:
(1) user behavior understanding, study and Study of recognition
User behavior is understood and to be comprised that the user behavior formalization is understood and study, user browsing behavior priori probability density distributed data base build and based on
Figure BSA00000709741600012
The user behavior identification of Bayes.Adopt investigation on the net questionnaire, manual research questionnaire, send the mode such as mail test at random, obtain in the URL address browse web sites, the access of input information, clickthrough, the user that downloads is normal and the suspicious behavior type of browsing of electronics Email, QQ, shopping website link, adopt similar " behavior of if URL Input Address then normal browsing " rule that the user is browsed capable formalized description, set up the priori probability density regularity of distribution of user browsing behavior, utilize
Figure BSA00000709741600021
Bayes sets up the user behavior recognizer, activates when the user may access fishing website and detects engine.
(2) fishing website lightweight Intelligent Measurement engine research
Monthly statistical information by pertinent literature reading and PhishTank and the upper announcement of APAC shows: the phishing attacks number of times comes and go, but target of attack is concentrated, mainly concentrates on the websites such as payment transaction, financial instrument, instant messaging, broadcasting media.According to APAC2011 bulletin in December, the fishing website total amount that relates to Taobao, Tengxun, industrial and commercial bank, Bank of China accounts for 94.39% of whole report amounts.The famous website knowledge base of model is as the Heuristics that detects engine.Comprise in the knowledge base: domain name, IP address, URL, trade (brand) name, copyright information, Logo describe the information that the factor, WHOIS etc. describe identity.The detailed technology route of fishing website lightweight Intelligent Measurement engine research is as follows:
The online fast filtering Mechanism Study of URL adopts white list fast filtering mechanism, to the white list of user add, detects engine and directly ignores detection; Seminar intends adopting the blacklist mechanism of synchronous PhishTank, APWG, Google Safe Browser API, to fishing URL fast filtering, stops user's access.
For the URL that can't judge, adopt the online detection algorithm of fishing URL that merges multilayer feature.This algorithm intends adopting structure, vocabulary, domain name and four layers of feature of server, sets up the learning classification model based on SVM, calculates as the Fast Classification of fishing website URL.
Fishing website interactivity fast filtering Mechanism Study is because the purpose of fishing website is for obtaining user's input information, therefore whether comprise server input list in the analyzing web page, such as form mark, input mark, login logon form, can effectively determine whether fishing website.For the website that does not have server input list, can directly judge not to be fishing website have the website of input list just need to detect from content is similar with vision.Detect for the fishing website interactivity, adopt the identification of web page server submission form and filtration based on dom tree.Utilize the markup language sources program analysis method, make up the webpage dom tree, form, input, login submission form control in the identification dom tree are realized quick fishing webpage classification.
Detect the contents such as navigation bar that learning algorithm research webpage noise refers to that web page template comprises, tissue marker, contact details, advertisement bar based on the fishing website of webpage noise.The webpage noise content comprises the website identity information mostly, and fishing website can be applied mechanically these information of targeted website in order better to confuse the user.Replace the whole content of webpage can realize the website identification with the webpage noise, can reduce again the webpage other guide to the impact of detection algorithm performance and efficient.To the webpage noise, seminar intends adopting n-gram, word frequency vector, the Web information processing technology such as TF-IDF, Shingle that the webpage noise is analyzed, determine the feature mode of webpage noise, make up SVM machine learning and disaggregated model, to judge that the suspected site has used famous website template, but inconsistent again with information in the knowledge base, judge fishing website with this.
The fishing website sorting algorithm research website Logo of website Logo identification is significant point in the webpage, also is user's area-of-interest.Often with website Logo identification website, fishing website also utilizes this characteristics user cheating to the network user.Seminar intends adopting SIFT to analyze famous website Logo characteristics, determine the characterization factor of describing website Logo, frequent counterfeit famous targeted sites Logo carries out modeling to fishing website, to judge that the suspected site has used famous Net station logo, but inconsistent again with information in the knowledge base, judge fishing website with this.
(3) phishing Intelligent treatment mechanism research
Browser BHO interface provides relevant interface specification, for phishing Intelligent treatment fishing website provides interface.Adopt and analyze first the various standards of browser BHO, interface, method, event, common class etc., determine and catch the click of user's mouse, keyboard input behavior, address field and status bar event methods; Input message uses the SHA-1 algorithm to obscure, and realizes phishing Intelligent treatment mechanism by programming.

Claims (4)

1. a phishing intelligence system of defense is characterized in that it is comprised of user behavior identification module, fishing website lightweight Intelligent Measurement engine and phishing intelligent processing module, for the network user provides intelligence, timely phishing defence service.
2. a kind of phishing intelligence system of defense according to claim 1 is characterized in that the user behavior identification module is based on
Figure FSA00000709741500011
The user behavior recognizer of Bayes.
3. a kind of phishing intelligence system of defense according to claim 1 is characterized in that fishing website lightweight Intelligent Measurement engine modules is identified four layers by URL, interactivity, webpage noise and website Logo and carried out fast detecting; Comprise the online detection algorithm of fishing URL that merges multilayer feature, detect learning algorithm and based on the fishing website detection algorithm of website Logo identification based on the fishing website of the web page server submission form identification of dom tree and filtration, webpage noise.
4. a kind of phishing intelligence system of defense according to claim 1 is characterized in that, for browser BHO object standard, to detected fishing website, adopts first the treatment mechanism of URL address field, status bar or other warning mark reminding users; When the user ignores caution mechanism, the information of user's input is obscured the module of protection.
CN2012101297567A2012-04-212012-04-21 An intelligent defense system for phishingPendingCN103379111A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2012101297567ACN103379111A (en)2012-04-212012-04-21 An intelligent defense system for phishing

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2012101297567ACN103379111A (en)2012-04-212012-04-21 An intelligent defense system for phishing

Publications (1)

Publication NumberPublication Date
CN103379111Atrue CN103379111A (en)2013-10-30

Family

ID=49463674

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2012101297567APendingCN103379111A (en)2012-04-212012-04-21 An intelligent defense system for phishing

Country Status (1)

CountryLink
CN (1)CN103379111A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104715369A (en)*2015-04-022015-06-17江苏金智教育信息技术有限公司Anti-phishing third party transaction method, device and system
CN104901847A (en)*2015-05-272015-09-09国家计算机网络与信息安全管理中心Social network zombie account detection method and device
CN104899508A (en)*2015-06-172015-09-09中国互联网络信息中心Multistage phishing website detecting method and system
CN105956633A (en)*2016-06-222016-09-21北京小米移动软件有限公司Search engine category identification method and apparatus
CN108965245A (en)*2018-05-312018-12-07国家计算机网络与信息安全管理中心Detection method for phishing site and system based on the more disaggregated models of adaptive isomery
US10313352B2 (en)2016-10-262019-06-04International Business Machines CorporationPhishing detection with machine learning
CN110413908A (en)*2018-04-262019-11-05维布络有限公司The method and apparatus classified based on web site contents to uniform resource locator
CN110784462A (en)*2019-10-232020-02-11北京邮电大学Three-layer phishing website detection system based on hybrid method
CN112567710A (en)*2018-08-092021-03-26微软技术许可有限责任公司System and method for polluting phishing activity responses
CN113806740A (en)*2021-09-302021-12-17上海易念信息科技有限公司Fishing simulation test method and system and electronic equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102316099A (en)*2011-07-282012-01-11中国科学院计算机网络信息中心Network fishing detection method and apparatus thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102316099A (en)*2011-07-282012-01-11中国科学院计算机网络信息中心Network fishing detection method and apparatus thereof

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李立: "基于贝叶斯网络的主机入侵检测系统研究与设计", 《万方学位论文》*
黄华军等: "网络钓鱼防御技术研究", 《信息网络安全》*
黄华军等: "网络钓鱼防御技术研究", 《信息网络安全》, 10 April 2012 (2012-04-10), pages 3*

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104715369A (en)*2015-04-022015-06-17江苏金智教育信息技术有限公司Anti-phishing third party transaction method, device and system
CN104715369B (en)*2015-04-022017-11-03江苏金智教育信息股份有限公司A kind of methods, devices and systems of the third party transaction of anti-fishing
CN104901847A (en)*2015-05-272015-09-09国家计算机网络与信息安全管理中心Social network zombie account detection method and device
CN104901847B (en)*2015-05-272018-10-30国家计算机网络与信息安全管理中心A kind of social networks corpse account detection method and device
CN104899508A (en)*2015-06-172015-09-09中国互联网络信息中心Multistage phishing website detecting method and system
CN104899508B (en)*2015-06-172018-12-07中国互联网络信息中心A kind of multistage detection method for phishing site and system
CN105956633A (en)*2016-06-222016-09-21北京小米移动软件有限公司Search engine category identification method and apparatus
US10313352B2 (en)2016-10-262019-06-04International Business Machines CorporationPhishing detection with machine learning
CN110413908A (en)*2018-04-262019-11-05维布络有限公司The method and apparatus classified based on web site contents to uniform resource locator
CN110413908B (en)*2018-04-262023-04-07维布络有限公司Method and device for classifying uniform resource locators based on website content
CN108965245A (en)*2018-05-312018-12-07国家计算机网络与信息安全管理中心Detection method for phishing site and system based on the more disaggregated models of adaptive isomery
CN112567710A (en)*2018-08-092021-03-26微软技术许可有限责任公司System and method for polluting phishing activity responses
CN112567710B (en)*2018-08-092023-08-18微软技术许可有限责任公司 Systems and methods for polluting phishing campaign responses
US12015639B2 (en)2018-08-092024-06-18Microsoft Technology Licensing, LlcSystems and methods for polluting phishing campaign responses
CN110784462A (en)*2019-10-232020-02-11北京邮电大学Three-layer phishing website detection system based on hybrid method
CN110784462B (en)*2019-10-232020-11-03北京邮电大学 Three-layer Phishing Website Detection System Based on Hybrid Method
CN113806740A (en)*2021-09-302021-12-17上海易念信息科技有限公司Fishing simulation test method and system and electronic equipment
CN113806740B (en)*2021-09-302024-04-16上海易念信息科技有限公司Fishing simulation test method, system and electronic equipment

Similar Documents

PublicationPublication DateTitle
CN103379111A (en) An intelligent defense system for phishing
Jain et al.A survey of phishing attack techniques, defence mechanisms and open research challenges
US12206705B2 (en)Phishing protection methods and systems
Mishra et al.SMS phishing and mitigation approaches
US20200042696A1 (en)Dynamic page similarity measurement
RU2607229C2 (en)Systems and methods of dynamic indicators aggregation to detect network fraud
CN104954372B (en)A kind of evidence obtaining of fishing website and verification method and system
CN102098235B (en)Fishing mail inspection method based on text characteristic analysis
Aggarwal et al.Identification and detection of phishing emails using natural language processing techniques
Rathee et al.Detection of E-mail phishing attacks–using machine learning and deep learning
CN105119909B (en)A kind of counterfeit website detection method and system based on page visual similarity
Wardman et al.High-performance content-based phishing attack detection
WO2005027016A2 (en)Fraudulent message detection
CN110443031A (en)A kind of two dimensional code Risk Identification Method and system
CN108173814A (en)Detection method for phishing site, terminal device and storage medium
Wang et al.Verilogo: Proactive phishing detection via logo recognition
CN106060038B (en)Detection method for phishing site based on client-side program behavioural analysis
Razaque et al.Detection of phishing websites using machine learning
Zeydan et al.Survey of anti-phishing tools with detection capabilities
Acharya et al.The imitation game: Exploring brand impersonation attacks on social media platforms
KR20070067651A (en) How to prevent phishing by analyzing Internet site patterns
Manek et al.Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites
Saraswat et al.Phishing detection in e-mails using machine learning
Wen et al.Detecting malicious websites in depth through analyzing topics and web-pages
Mehta et al.A review of social engineering attacks and their mitigation solutions

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C02Deemed withdrawal of patent application after publication (patent law 2001)
WD01Invention patent application deemed withdrawn after publication

Application publication date:20131030


[8]ページ先頭

©2009-2025 Movatter.jp