DocumentCode :
2524165
Title :
Identifying vulnerable websites by analysis of common strings in phishing URLs
Author :
Wardman, Brad ; Shukla, Gaurang ; Warner, Gary
Author_Institution :
Comput. Forensics Lab., Univ. of Alabama at Birmingham, Birmingham, AL, USA
fYear :
2009
fDate :
Sept. 20 2009-Oct. 21 2009
Firstpage :
1
Lastpage :
13
Abstract :
It has been shown that most phishing sites are created by means of a vulnerable Web server being re-purposed by a phisher to host a counterfeit Website without the knowledge of the server´s owner. In this paper, we examine common vulnerabilities which allow these phishing sites to be created and suggest a method for identifying common attack methods, as well as, help inform Webmasters and their hosting companies in ways that help them to defend their servers. Our method involves applying a longest common substring algorithm to known phishing URLs, and investigating the results of that string to identify common vulnerabilities, exploits, and attack tools which may be prevalent among those who hack servers for phishing. Following a case study approach, we then select four prevalent attacks that are suggested by our methodology, and use our findings to identify the underlying vulnerability, and document statistics showing that these vulnerabilities are responsible for the creation of phishing Websites. Digging further, we identify attack tools created to exploit these vulnerabilities and how they are detected by current intrusion detection signatures. We suggest a means by which this work could be integrated with intrusion detection systems to allow Webmasters or hosting providers to reduce their vulnerability to hosting phishing Websites.
Keywords :
Web sites; computer crime; URL phishing; Web server; Websites phishing; document statistics; longest common substring algorithm; vulnerable Websites identification; Computer crime; Counterfeiting; Data mining; Databases; File servers; Forensics; Intrusion detection; Uniform resource locators; Unsolicited electronic mail; Web server; Exploits; Phishing; Remote File Inclusion; Vulnerabilities;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
eCrime Researchers Summit, 2009. eCRIME '09.
Conference_Location :
Tacoma, WA
Print_ISBN :
978-1-4244-4625-4
Type :
conf
DOI :
10.1109/ECRIME.2009.5342610
Filename :
5342610
Link To Document :
بازگشت