• DocumentCode
    1675484
  • Title

    Bypassing Security Toolbars and Phishing Filters via DNS Poisoning

  • Author

    Abu-Nimeh, Saeed ; Nair, Suku

  • Author_Institution
    Comput. Sci. & Eng. Dept.., Southern Methodist Univ., Dallas, TX
  • fYear
    2008
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, Web browsers have added built-in phishing filters mimicking the same functionality to detect phishing sites. The present study proposes a new attack to bypass security toolbars and phishing filters via DNS poisoning. Spoofed DNS cache entries are used to forge the results provided to security toolbars and thus misleading information is displayed to the victim. Although there are several studies that demonstrate DNS poisoning attacks, none to our best knowledge, investigate whether such attacks can circumvent security toolbars or phishing filters. Four well-known security toolbars and three reputable browser built- in phishing filters are scrutinized. None of the seven tools detect the attack. Worse still, security toolbars provide the victim with false confirmative indicators that the phishing site is legitimate.
  • Keywords
    Internet; computer crime; information filters; online front-ends; DNS poisoning; Web browsers; phishing filters; security toolbars; spoofed DNS cache; Computer crime; Computer science; Computer security; Costs; Data engineering; Data security; Information filtering; Information filters; Information security; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
  • Conference_Location
    New Orleans, LO
  • ISSN
    1930-529X
  • Print_ISBN
    978-1-4244-2324-8
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2008.ECP.386
  • Filename
    4698161