Waste Flooding: A Phishing Retaliation Tool

Cristoffer Leite, Joao J.C. Gondim, Priscila Solis Barreto, Eduardo A. Alchieri

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

Phishing is a well known attack technique that is still a growing threat in the security area. The Internet popularity and the always connected users increased phishing possibilities by giving attackers new instruments and allowing closer contact to their focus. By applying social engineering methods, phishing thrives on misinformation and because of this, current main phishing response methods focus only on educating users or blocking phishing attempts, without any response to derail the already implemented attacks. These conditions may leave targeted users unprotected, as any leaked information can not be tracked to determine which person suffered from phishing and compromised data that can not be saved or easily detected. In this paper, we present, analyse and evaluate a new response tool that aims to furtively retaliate these attacks by automatic detecting phishing forms and using them to clutter phishing databases with useless information and conceal user data. The evaluation shows that the tool may be useful as a detection-resistant solution and gives a fair response to phishing attempts by flooding the phishing databases.

Original languageEnglish
Title of host publication2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019
EditorsAris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)9781728125220
DOIs
Publication statusPublished - Sept 2019
Event18th IEEE International Symposium on Network Computing and Applications, NCA 2019 - Cambridge, United States
Duration: 26 Sept 201928 Sept 2019

Conference

Conference18th IEEE International Symposium on Network Computing and Applications, NCA 2019
Country/TerritoryUnited States
CityCambridge
Period26/09/1928/09/19

Bibliographical note

Funding Information:
VI. ACKNOWLEDGMENTS The authors received support to develop this research from the P4SEC Project and the Atmosphere Project, both granted by the RNP/CTIC/MCTIC of the Brazilian Government.

Publisher Copyright:
© 2019 IEEE.

Funding

VI. ACKNOWLEDGMENTS The authors received support to develop this research from the P4SEC Project and the Atmosphere Project, both granted by the RNP/CTIC/MCTIC of the Brazilian Government.

Fingerprint

Dive into the research topics of 'Waste Flooding: A Phishing Retaliation Tool'. Together they form a unique fingerprint.

Cite this