Waste Flooding: A Phishing Retaliation Tool

@article{Leite2019WasteFA,
  title={Waste Flooding: A Phishing Retaliation Tool},
  author={Cristoffer Leite and Jo{\~a}o Jos{\'e} Costa Gondim and Priscila A. Sol{\'i}s Barreto and Eduardo Ad{\'i}lio Pelinson Alchieri},
  journal={2019 IEEE 18th International Symposium on Network Computing and Applications (NCA)},
  year={2019},
  pages={1-8}
}
Phishing is a well known attack technique that is still a growing threat in the security area. The Internet popularity and the always connected users increased phishing possibilities by giving attackers new instruments and allowing closer contact to their focus. By applying social engineering methods, phishing thrives on misinformation and because of this, current main phishing response methods focus only on educating users or blocking phishing attempts, without any response to derail the… 

Phishing Mitigation Techniques: A Literature Survey

This paper reveals the different email and website phishing solutions in phishing attack detection and discusses on the limitations of the techniques, before concluding with an exploration of how phishing detection can be improved.

References

SHOWING 1-10 OF 22 REFERENCES

BogusBiter: A transparent protection against phishing attacks

BogusBiter is a unique client-side anti-phishing tool, which transparently feeds a relatively large number of bogus credentials into a suspected phishing site, and enables a legitimate Web site to identify stolen credentials in a timely manner.

Humboldt: A distributed phishing disruption system

Humboldt is a distributed system that submits poisonous fake data to phishing web sites that is indistinguishable from the input of actual phishing victims, and provides a mechanism for tracking activities associated with identity theft.

Tracking Phishing Attacks Over Time

Monitoring of phishing attacks over a period of ten months found that over 90% of these attacks were actually replicas or variations of other attacks in the database, showing that the current prevention techniques are ineffective and need to be overhauled.

Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks

  • C. M. McRaeR. Vaughn
  • Computer Science
    2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
  • 2007
A new phishing investigative technique using Web bugs and honeytokens to track down a phisher to the IP address of the phisher's workstation rather than innocent machines used as intermediaries.

A survey of phishing attacks: Their types, vectors and technical approaches

A recent review of conventional vs. automated cybersecurity anti-phishing techniques

Examining the impact of website take-down on phishing

Empirical data on phishing website removal times and the number of visitors that the websites attract are analyzed, and it is concluded that website removal is part of the answer to phishing, but it is not fast enough to completely mitigate the problem.

A novel anti-phishing framework based on honeypots

As a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new phishing sites can be earlier detected

Exploring susceptibility to phishing in the workplace

CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites

A layered anti-phishing solution that aims at exploiting the expressiveness of a rich set of features with machine learning to achieve a high true positive rate (TP) on novel phish, and limiting the FP to a low level via filtering algorithms.