Movatterモバイル変換


[0]ホーム

URL:


US20080163369A1 - Dynamic phishing detection methods and apparatus - Google Patents

Dynamic phishing detection methods and apparatus
Download PDF

Info

Publication number
US20080163369A1
US20080163369A1US11/617,569US61756906AUS2008163369A1US 20080163369 A1US20080163369 A1US 20080163369A1US 61756906 AUS61756906 AUS 61756906AUS 2008163369 A1US2008163369 A1US 2008163369A1
Authority
US
United States
Prior art keywords
website
webpage
hyperlink
transaction
websites
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/617,569
Inventor
Ming-Tai Allen Chang
Yu-Fang Eddie Tsai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trend Micro Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US11/617,569priorityCriticalpatent/US20080163369A1/en
Assigned to TREND MICRO INCORPORATEDreassignmentTREND MICRO INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CHANG, MING-TAI ALLEN, TSAI, YU-FANG EDDIE
Publication of US20080163369A1publicationCriticalpatent/US20080163369A1/en
Priority to US16/545,995prioritypatent/US10951636B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computer-implemented method for detecting a phishing attempt by a given website is provided. The method includes receiving a webpage from the given website, which includes computer-readable code for the webpage. The method also includes ascertaining hyperlink references in the computer-readable code. Each hyperlink reference refers to at least a component of another webpage. The method further includes performing linking relationship analysis on at least a subset of websites identified to be referenced by the hyperlink references, which includes determining whether a first website is in a bi-directional/uni-directional linking relationship with the given website. The first website is one of the subset of websites. The method yet also includes, if the first website is in the bi-directional linking relationship, designating the given website a non-phishing website. The method yet further includes, if the first website is in the uni-directional linking relationship, performing anti-phishing measures with respect to the given website.

Description

Claims (17)

1. A computer-implemented method for detecting a phishing attempt by a given website, comprising:
receiving a webpage from said given website, including computer-readable code for said webpage;
ascertaining a set of hyperlink references in said computer-readable code, each hyperlink reference in said set of hyperlink references referencing at least a component of another webpage that is associated with said given website or a website different from said given website;
performing linking relationship analysis on at least a subset of websites identified to be referenced by said set of hyperlink references, including determining whether a first website that is associated with a webpage referenced by a first one of said set of hyperlink references is in a bi-directional linking relationship with said given website or in a uni-directional linking relationship with said given website, said first website being one of said subset of websites;
if said first website is in said bi-directional linking relationship with said given website, designating said given website a non-phishing website; and
if said first website is in said uni-directional linking relationship with said given website, performing anti-phishing measures with respect to said given website.
6. A computer-implemented method for detecting a phishing attempt by a given website, comprising:
receiving a webpage from said given website, including computer-readable code for said webpage;
obtaining from said computer readable code a transaction destination URL, said transaction destination URL representing a destination URL for transaction information requested by said webpage;
ascertaining a set of hyperlink references in said computer-readable code, each hyperlink reference in said set of hyperlink references referencing at least a component of another webpage that is associated with given website or a website different from said given website;
performing transaction destination analysis on at least a subset of websites identified to be referenced by said set of hyperlink references, including ascertaining a first transaction destination URL specified by a transaction page in a first website that is associated with a webpage referenced by a first one of said set of hyperlink references, said first transaction destination URL representing a destination URL for transaction information requested by said transaction page in said first website; and
if said transaction destination URL obtained from said computer readable code for said webpage from said given website is different from said first transaction destination URL, performing anti-phishing measures with respect to said given website.
12. An article of manufacture having thereon computer storage medium and computer readable code configured for a phishing attempt by a given website, comprising:
computer readable code for receiving a webpage from said given website, including computer-readable code for said webpage;
computer readable code for obtaining from said computer readable code a transaction destination URL, said transaction destination URL representing a destination URL for transaction information requested by said webpage;
computer readable code for ascertaining a set of hyperlink references in said computer-readable code, each hyperlink reference in said set of hyperlink references referencing at least a component of another webpage that is associated with given website or a website different from said given website;
performing transaction destination analysis on at least a subset of websites identified to be referenced by said set of hyperlink references, including ascertaining a first transaction destination URL specified by a transaction page in a first website that is associated with a webpage referenced by a first one of said set of hyperlink references, said first transaction destination URL representing a destination URL for transaction information requested by said transaction page in said first website; and
if said transaction destination URL obtained from said computer readable code for said webpage from said given website is different from said first transaction destination URL, performing anti-phishing measures with respect to said given website.
US11/617,5692006-12-282006-12-28Dynamic phishing detection methods and apparatusAbandonedUS20080163369A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US11/617,569US20080163369A1 (en)2006-12-282006-12-28Dynamic phishing detection methods and apparatus
US16/545,995US10951636B2 (en)2006-12-282019-08-20Dynamic phishing detection methods and apparatus

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/617,569US20080163369A1 (en)2006-12-282006-12-28Dynamic phishing detection methods and apparatus

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US16/545,995ContinuationUS10951636B2 (en)2006-12-282019-08-20Dynamic phishing detection methods and apparatus

Publications (1)

Publication NumberPublication Date
US20080163369A1true US20080163369A1 (en)2008-07-03

Family

ID=39586022

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/617,569AbandonedUS20080163369A1 (en)2006-12-282006-12-28Dynamic phishing detection methods and apparatus
US16/545,995Active2027-01-27US10951636B2 (en)2006-12-282019-08-20Dynamic phishing detection methods and apparatus

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US16/545,995Active2027-01-27US10951636B2 (en)2006-12-282019-08-20Dynamic phishing detection methods and apparatus

Country Status (1)

CountryLink
US (2)US20080163369A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090006532A1 (en)*2007-06-282009-01-01Yahoo! Inc.Dynamic phishing protection in instant messaging
US20090150448A1 (en)*2006-12-062009-06-11Stephan LechnerMethod for identifying at least two similar webpages
US20100043058A1 (en)*2008-08-132010-02-18Novell, Inc.System and method for facilitating user authentication of web page content
US20100043071A1 (en)*2008-08-122010-02-18Yahoo! Inc.System and method for combating phishing
US20100083098A1 (en)*2008-09-302010-04-01Microsoft CorporationStreaming Information that Describes a Webpage
US20100257024A1 (en)*2009-04-072010-10-07Verisign, Inc.Domain Traffic Ranking
WO2010118115A1 (en)*2009-04-072010-10-14Verisign, Inc.Domain status, purpose and categories
US20100274836A1 (en)*2009-04-222010-10-28Verisign, Inc.Internet Profile Service
US20110040604A1 (en)*2009-08-132011-02-17Vertical Acuity, Inc.Systems and Methods for Providing Targeted Content
US20120159620A1 (en)*2010-12-212012-06-21Microsoft CorporationScareware Detection
US8424091B1 (en)*2010-01-122013-04-16Trend Micro IncorporatedAutomatic local detection of computer security threats
US20130263263A1 (en)*2010-12-132013-10-03Comitari Technologies Ltd.Web element spoofing prevention system and method
US20140259158A1 (en)*2013-03-112014-09-11Bank Of America CorporationRisk Ranking Referential Links in Electronic Messages
US8893286B1 (en)*2011-04-082014-11-18Symantec CorporationSystems and methods for preventing fraudulent activity associated with typo-squatting procedures
US9065850B1 (en)2011-02-072015-06-23Zscaler, Inc.Phishing detection systems and methods
US20160036853A1 (en)*2014-07-302016-02-04DeNA Co., Ltd.Storage medium storing program for login alerts, and method and system thereof
US20170070460A1 (en)*2015-09-082017-03-09F-Secure CorporationControlling Access to Web Resources
US9621566B2 (en)2013-05-312017-04-11Adi Labs IncorporatedSystem and method for detecting phishing webpages
US20200042696A1 (en)*2006-12-282020-02-06Trend Micro IncorporatedDynamic page similarity measurement
US20220368699A1 (en)*2021-05-112022-11-17AVAST Software s.r.o.User and group specific threat protection system and method
US11870808B1 (en)*2019-12-122024-01-09Zimperium, Inc.Mobile device security application for malicious website detection based on representative image

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050240756A1 (en)*2003-01-122005-10-27Yaron MayerSystem and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows.
US20060123478A1 (en)*2004-12-022006-06-08Microsoft CorporationPhishing detection, prevention, and notification
US20060179005A1 (en)*2005-02-042006-08-10Farstone Tech, Inc.Network security system and methods regarding the same
US20080046970A1 (en)*2006-08-152008-02-21Ian OliverDetermining an invalid request

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8037527B2 (en)*2004-11-082011-10-11Bt Web Solutions, LlcMethod and apparatus for look-ahead security scanning
US7630987B1 (en)*2004-11-242009-12-08Bank Of America CorporationSystem and method for detecting phishers by analyzing website referrals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050240756A1 (en)*2003-01-122005-10-27Yaron MayerSystem and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows.
US20060123478A1 (en)*2004-12-022006-06-08Microsoft CorporationPhishing detection, prevention, and notification
US20060179005A1 (en)*2005-02-042006-08-10Farstone Tech, Inc.Network security system and methods regarding the same
US20080046970A1 (en)*2006-08-152008-02-21Ian OliverDetermining an invalid request

Cited By (40)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090150448A1 (en)*2006-12-062009-06-11Stephan LechnerMethod for identifying at least two similar webpages
US11042630B2 (en)*2006-12-282021-06-22Trend Micro IncorporatedDynamic page similarity measurement
US20200042696A1 (en)*2006-12-282020-02-06Trend Micro IncorporatedDynamic page similarity measurement
US20090006532A1 (en)*2007-06-282009-01-01Yahoo! Inc.Dynamic phishing protection in instant messaging
US8528079B2 (en)*2008-08-122013-09-03Yahoo! Inc.System and method for combating phishing
US20100043071A1 (en)*2008-08-122010-02-18Yahoo! Inc.System and method for combating phishing
US20100043058A1 (en)*2008-08-132010-02-18Novell, Inc.System and method for facilitating user authentication of web page content
US8701172B2 (en)*2008-08-132014-04-15Apple Inc.System and method for facilitating user authentication of web page content
US20100083098A1 (en)*2008-09-302010-04-01Microsoft CorporationStreaming Information that Describes a Webpage
US8909760B2 (en)2009-04-072014-12-09Verisign, Inc.Domain popularity scoring
CN102460417A (en)*2009-04-072012-05-16弗里塞恩公司Domain status, purpose and categories
US20100257024A1 (en)*2009-04-072010-10-07Verisign, Inc.Domain Traffic Ranking
WO2010118115A1 (en)*2009-04-072010-10-14Verisign, Inc.Domain status, purpose and categories
US8521908B2 (en)2009-04-072013-08-27Verisign, Inc.Existent domain name DNS traffic capture and analysis
US20110087769A1 (en)*2009-04-072011-04-14Verisign, Inc.Domain Popularity Scoring
US8527658B2 (en)2009-04-072013-09-03Verisign, IncDomain traffic ranking
US9769035B2 (en)2009-04-072017-09-19Verisign, Inc.Domain popularity scoring
US9292612B2 (en)2009-04-222016-03-22Verisign, Inc.Internet profile service
US9742723B2 (en)2009-04-222017-08-22Verisign, Inc.Internet profile service
US20100274836A1 (en)*2009-04-222010-10-28Verisign, Inc.Internet Profile Service
US20110040604A1 (en)*2009-08-132011-02-17Vertical Acuity, Inc.Systems and Methods for Providing Targeted Content
US8424091B1 (en)*2010-01-122013-04-16Trend Micro IncorporatedAutomatic local detection of computer security threats
US20130263263A1 (en)*2010-12-132013-10-03Comitari Technologies Ltd.Web element spoofing prevention system and method
US9130988B2 (en)*2010-12-212015-09-08Microsoft Technology Licensing, LlcScareware detection
US20120159620A1 (en)*2010-12-212012-06-21Microsoft CorporationScareware Detection
US9065850B1 (en)2011-02-072015-06-23Zscaler, Inc.Phishing detection systems and methods
US8893286B1 (en)*2011-04-082014-11-18Symantec CorporationSystems and methods for preventing fraudulent activity associated with typo-squatting procedures
US20140259158A1 (en)*2013-03-112014-09-11Bank Of America CorporationRisk Ranking Referential Links in Electronic Messages
US9344449B2 (en)*2013-03-112016-05-17Bank Of America CorporationRisk ranking referential links in electronic messages
US9635042B2 (en)*2013-03-112017-04-25Bank Of America CorporationRisk ranking referential links in electronic messages
US9621566B2 (en)2013-05-312017-04-11Adi Labs IncorporatedSystem and method for detecting phishing webpages
US20160036853A1 (en)*2014-07-302016-02-04DeNA Co., Ltd.Storage medium storing program for login alerts, and method and system thereof
GB2542140B (en)*2015-09-082019-09-11F Secure CorpControlling access to web resources
US10474810B2 (en)*2015-09-082019-11-12F-Secure CorporationControlling access to web resources
GB2542140A (en)*2015-09-082017-03-15F Secure CorpControlling access to web resources
US20170070460A1 (en)*2015-09-082017-03-09F-Secure CorporationControlling Access to Web Resources
US11870808B1 (en)*2019-12-122024-01-09Zimperium, Inc.Mobile device security application for malicious website detection based on representative image
US20220368699A1 (en)*2021-05-112022-11-17AVAST Software s.r.o.User and group specific threat protection system and method
US11949693B2 (en)*2021-05-112024-04-02AVAST Software s.r.o.User and group specific threat protection system and method
US12413607B2 (en)*2021-05-112025-09-09AVAST Software s.r.o.User and group specific threat protection system and method

Also Published As

Publication numberPublication date
US20200045067A1 (en)2020-02-06
US10951636B2 (en)2021-03-16

Similar Documents

PublicationPublication DateTitle
US10951636B2 (en)Dynamic phishing detection methods and apparatus
US11042630B2 (en)Dynamic page similarity measurement
AU2006200688B2 (en)Internet security
US9148445B2 (en)Method and system for misuse detection
US7802298B1 (en)Methods and apparatus for protecting computers against phishing attacks
Alkhozae et al.Phishing websites detection based on phishing characteristics in the webpage source code
US20130263263A1 (en)Web element spoofing prevention system and method
US20060070126A1 (en)A system and methods for blocking submission of online forms.
KR20190026691A (en) System and method for detecting online fraud
WO2014063520A1 (en)Method and apparatus for determining phishing website
Bin et al.A DNS based anti-phishing approach
Dadkhah et al.An introduction to journal phishings and their detection approach
JP4781922B2 (en) Link information verification method, system, apparatus, and program
Rajalingam et al.Prevention of phishing attacks based on discriminative key point features of webpages
Paturi et al.Detection of phishing attacks using visual similarity model
KR20070067651A (en) How to prevent phishing by analyzing Internet site patterns
Roopak et al.On effectiveness of source code and SSL based features for phishing website detection
Glăvan et al.Detection of phishing attacks using the anti-phishing framework
Prem et al.Phishing and anti-phishing techniques
Salihu et al.Detection of phishing URLs using heuristics-based approach
CN107682346B (en) A fast positioning and identification system and method for CSRF attack
US12095814B2 (en)Phishing website detection by checking form differences followed by false credentials submission
JP2007233904A (en) Counterfeit site detection method and computer program
Enoch et al.Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
JP4564916B2 (en) Phishing fraud countermeasure method, terminal, server and program

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:TREND MICRO INCORPORATED, JAPAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHANG, MING-TAI ALLEN;TSAI, YU-FANG EDDIE;REEL/FRAME:019114/0851

Effective date:20061222

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp