Abstract
Phishing is a well known attack technique that is still a growing threat in the security area. The Internet popularity and the always connected users increased phishing possibilities by giving attackers new instruments and allowing closer contact to their focus. By applying social engineering methods, phishing thrives on misinformation and because of this, current main phishing response methods focus only on educating users or blocking phishing attempts, without any response to derail the already implemented attacks. These conditions may leave targeted users unprotected, as any leaked information can not be tracked to determine which person suffered from phishing and compromised data that can not be saved or easily detected. In this paper, we present, analyse and evaluate a new response tool that aims to furtively retaliate these attacks by automatic detecting phishing forms and using them to clutter phishing databases with useless information and conceal user data. The evaluation shows that the tool may be useful as a detection-resistant solution and gives a fair response to phishing attempts by flooding the phishing databases.
Original language | English |
---|---|
Title of host publication | 2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019 |
Editors | Aris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky |
Publisher | Institute of Electrical and Electronics Engineers |
ISBN (Electronic) | 9781728125220 |
DOIs | |
Publication status | Published - Sept 2019 |
Event | 18th IEEE International Symposium on Network Computing and Applications, NCA 2019 - Cambridge, United States Duration: 26 Sept 2019 → 28 Sept 2019 |
Conference
Conference | 18th IEEE International Symposium on Network Computing and Applications, NCA 2019 |
---|---|
Country/Territory | United States |
City | Cambridge |
Period | 26/09/19 → 28/09/19 |
Bibliographical note
Funding Information:VI. ACKNOWLEDGMENTS The authors received support to develop this research from the P4SEC Project and the Atmosphere Project, both granted by the RNP/CTIC/MCTIC of the Brazilian Government.
Publisher Copyright:
© 2019 IEEE.
Funding
VI. ACKNOWLEDGMENTS The authors received support to develop this research from the P4SEC Project and the Atmosphere Project, both granted by the RNP/CTIC/MCTIC of the Brazilian Government.