Advertisement

An Analysis of a New Detection Method for Spear Phishing Attack

  • Yaping ChiEmail author
  • Zhiting Ling
  • Xuejing Ba
  • Shuhao Li
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 517)

Abstract

A new method to detect credential spear phishing attack for the network is introduced in the conference of 26th USENIX Security Symposium. First, on the basis of the researching for the processes and the principles of spear phishing attack, and the overall structure of its detector, the Directed Anomaly Scoring technology is analyzed in the paper. Second, the selections of scalars in subdetectors are defined. Third, the spear phishing attack detection method of detector and the methods of traditional detection are compared and analyzed. And then, the obvious advantages of the detector are discussed. The prospection of the spear phishing attack detection development is also given at the end of the paper.

Keywords

Spear phishing Phishing detecting Credential DAS 

Notes

Acknowledgements

This research was financially supported by the National Key Research and Development Plan (2018YFB1004101).

References

  1. 1.
    Anti-Phishing Alliance of China (APAC): [R/OL]. [2017-10]. http://apac.cn/gzdt/201710/P020171012610151655807.pdf
  2. 2.
    Huan, W.: Research on defense based on harpoon phishing attack. Comput. Knowl. Technol. 12(8), 51–54 (2016)Google Scholar
  3. 3.
    Ho, G.: Detecting Credential Spear phishing Attacks in Enterprise Settings [EB/OL]. [2017-8-16]. https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf
  4. 4.
    Sha, H., Liu, Q., Liu, T., et al.: Survey on malicious webpage detection research. J. Comput. 39(03), 529–542 (2016)Google Scholar
  5. 5.
    Akinyelu, A.A., Adewumi, A.O.: Classification of phishing email using random forest machine learning technique. J. Appl. Math. (2014-4-3), 2014(1), 89–108 (2014)Google Scholar
  6. 6.
    Anti-Phishing Working Group (APWG): Global phishing survey: trends and domain name use in 2H2014 [EB/OL]. [2014-5-27]. http://apwg.org/download/document/245/APWG_Global_Phishing_Report_2H_2014.pdf
  7. 7.
    Hongfu, H.U., Peng, G.: Mechanism of phishing email detection based on user interaction and its realization. Comput. Eng. Appl. 53(15), 7–13 (2017)Google Scholar
  8. 8.
    Ramesh, G., Krishnamurthi, I., Kumar, K.S.S.: An efficacious method for detecting phishing webpages through target domain identification. Decis. Support Syst. 61(5), 12–22 (2014)CrossRefGoogle Scholar
  9. 9.
    Yan, Z., Liu, S., Wang, T., et al.: A genetic algorithm based model for chinese phishing e-commerce websites detection. In: The International Conference on HCI in Business, Government, and Organizations: Commerce and Innovation, pp. 270–279. Springer International Publishing (2016)Google Scholar
  10. 10.
    Liu, S., Peng, H., Lin, H., et al.: Detection technology of phishing web based on network spider and LD algorithm. Autom. Instrum. 188(6), 165–166 (2015)Google Scholar
  11. 11.
    Huang, H., Qian, L., Wang, Y.: Detection of phishing URL based on abnormal feature. Inf. Netw. Secur. 2012(1), 23–25 (2012)Google Scholar
  12. 12.
    Lu, K., Zhou, A.: Phishing-website detection based on image similarity. Inf. Secur. Commun. Priv. 54(3), 115–117 (2016)Google Scholar
  13. 13.
    Xu, H., Xu, H., Lei, L.: Phishing recognition technology based on fusion of multiple features classification and recognition algorithm. Appl. Res. Comput. 34(04), 1129–1132 (2017)Google Scholar
  14. 14.
    Guan, Y., Zou, F., Yi, P.: Web phishing detection algorithm based on graph mining. Microcomput. Appl. 32(7), 1–5 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Yaping Chi
    • 1
    • 2
    Email author
  • Zhiting Ling
    • 1
    • 2
  • Xuejing Ba
    • 1
  • Shuhao Li
    • 1
  1. 1.Department of Communication EngineeringBeijing Electronic Science and Technology InstituteBeijingChina
  2. 2.Key Laboratory of Network Assessment TechnologyInstitute of Information Engineering, Chinese Academy of SciencesBeijingChina

Personalised recommendations