Publication | Closed Access
Beyond the lock icon: real-time detection of phishing websites using public key certificates
59
Citations
22
References
2015
Year
Unknown Venue
Spam FilteringPublic Key CertificatesAbuse DetectionInternet SecurityEngineeringInformation SecurityThreat DetectionIdentity-based SecurityMachine-learning ApproachInformation ForensicsImmediate Local IdentificationReal-time DetectionComputer SciencePage ContentLock IconPhishingCryptography
We propose a machine-learning approach to detect phishing websites using features from their X.509 public key certificates. We show that its efficacy extends beyond HTTPS-enabled sites. Our solution enables immediate local identification of phishing sites. As such, this serves as an important complement to the existing server-based anti-phishing mechanisms which predominately use blacklists. Blacklisting suffers from several inherent drawbacks in terms of correctness, timeliness, and completeness. Due to the potentially significant lag prior to site blacklisting, there is a window of opportunity for attackers. Other local client-side phishing detection approaches also exist, but primarily rely on page content or URLs, which are arguably easier to manipulate by attackers. We illustrate that our certificate-based approach greatly increases the difficulty of masquerading undetected for phishers, with single millisecond delays for users. We further show that this approach works not only against HTTPS-enabled phishing attacks, but also detects HTTP phishing attacks with port 443 enabled.
| Year | Citations | |
|---|---|---|
Page 1
Page 1