2014
PhiGARo: Automatic Phishing Detection and Incident Response Framework
HUSÁK, Martin a Jakub ČEGANZákladní údaje
Originální název
PhiGARo: Automatic Phishing Detection and Incident Response Framework
Autoři
HUSÁK, Martin ORCID a Jakub ČEGAN
Vydání
Fribourg, Switzerland, Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, od s. 295-302, 8 s. 2014
Nakladatel
IEEE
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Obor
10201 Computer sciences, information science, bioinformatics
Stát vydavatele
Spojené státy
Utajení
není předmětem státního či obchodního tajemství
Forma vydání
paměťový nosič (CD, DVD, flash disk)
Odkazy
Označené pro přenos do RIV
Ano
Kód RIV
RIV/00216224:14610/14:00076370
Organizační jednotka
Ústav výpočetní techniky
ISBN
978-1-4799-4223-7
UT WoS
EID Scopus
Klíčová slova česky
phishing; PhiGARo; honeypot; CSIRT; IPFIX
Klíčová slova anglicky
phishing; PhiGARo; honeypot; CSIRT; IPFIX
Štítky
Příznaky
Mezinárodní význam, Recenzováno
Změněno: 17. 2. 2016 10:02, RNDr. Martin Husák, Ph.D.
Anotace
V originále
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing incidents automatically, it depends on reports of phishing incidents from users. We propose a framework which introduces honey pots into the process in order to eliminate the reliance on user input. The honey pots are used to capture e-mails, automatically detect messages containing phishing and immediately transfer them to PhiGARo. There is a need to propagate e-mail addresses of a honey pot to attract phishers. We discuss approaches to the honey pot e-mail propagation and propose a further enhancement to using honey pots in response to phishing incidents. We propose providing phishers with false credentials, accounts and documents that will grant them access to other honey pot services. Tracing these honey tokens may lead us to the originators of the phishing attacks and help investigations into phishing incidents.