Waste Flooding: A Phishing Retaliation Tool

@article{Leite2019WasteFA,
  title={Waste Flooding: A Phishing Retaliation Tool},
  author={Cristoffer Leite and Jo{\~a}o Jos{\'e} Costa Gondim and Priscila A. Sol{\'i}s Barreto and Eduardo Ad{\'i}lio Pelinson Alchieri},
  journal={2019 IEEE 18th International Symposium on Network Computing and Applications (NCA)},
  year={2019},
  pages={1-8}
}
Phishing is a well known attack technique that is still a growing threat in the security area. The Internet popularity and the always connected users increased phishing possibilities by giving attackers new instruments and allowing closer contact to their focus. By applying social engineering methods, phishing thrives on misinformation and because of this, current main phishing response methods focus only on educating users or blocking phishing attempts, without any response to derail the… 
Phishing Mitigation Techniques: A Literature Survey
TLDR
This paper reveals the different email and website phishing solutions in phishing attack detection and provides a literature analysis of different existing phishing mitigation approaches, followed by a discussion on the limitations of the techniques.

References

SHOWING 1-10 OF 22 REFERENCES
BogusBiter: A transparent protection against phishing attacks
TLDR
BogusBiter is a unique client-side anti-phishing tool, which transparently feeds a relatively large number of bogus credentials into a suspected phishing site, and enables a legitimate Web site to identify stolen credentials in a timely manner.
Humboldt: A distributed phishing disruption system
TLDR
Humboldt is a distributed system that submits poisonous fake data to phishing web sites that is indistinguishable from the input of actual phishing victims, and provides a mechanism for tracking activities associated with identity theft.
Tracking Phishing Attacks Over Time
TLDR
Monitoring of phishing attacks over a period of ten months found that over 90% of these attacks were actually replicas or variations of other attacks in the database, showing that the current prevention techniques are ineffective and need to be overhauled.
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks
  • C. M. McRae, R. Vaughn
  • Computer Science, Engineering
    2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
  • 2007
TLDR
A new phishing investigative technique using Web bugs and honeytokens to track down a phisher to the IP address of the phisher's workstation rather than innocent machines used as intermediaries.
A survey of phishing attacks: Their types, vectors and technical approaches
TLDR
A systematic, comprehensive and easy-to-follow review of the past and current phishing approaches is presented here and will give a better understanding of the characteristics of the existing phishing techniques which then acts as a stepping stone to the development of a holistic anti-phishing system.
A recent review of conventional vs. automated cybersecurity anti-phishing techniques
Examining the impact of website take-down on phishing
TLDR
Empirical data on phishing website removal times and the number of visitors that the websites attract are analyzed, and it is concluded that website removal is part of the answer to phishing, but it is not fast enough to completely mitigate the problem.
A novel anti-phishing framework based on honeypots
  • S. Li, R. Schmitz
  • Business, Computer Science
    2009 eCrime Researchers Summit
  • 2009
As a powerful anti-phishing tool, honeypots have been widely used by security service providers and financial institutes to collect phishing mails, so that new phishing sites can be earlier detected
Exploring susceptibility to phishing in the workplace
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites
TLDR
A layered anti-phishing solution that aims at exploiting the expressiveness of a rich set of features with machine learning to achieve a high true positive rate (TP) on novel phish, and limiting the FP to a low level via filtering algorithms.
...
1
2
3
...