首页> 外文会议>European symposium on research in computer security >Phishing Attacks Modifications and Evolutions
【24h】

Phishing Attacks Modifications and Evolutions

机译:网络钓鱼攻击的修改和演变

获取原文

摘要

So-called "phishing attacks" are attacks in which phishing sites are disguised as legitimate websites in order to steal sensitive information. Our previous research showed that phishing attacks tend to be relaunched many times, after sometimes small modifications. In this paper, we look into the details of these modifications and their evolution over time. We propose a model called the "Semi-Complete Linkage" (SCL) graph to perform our evaluation, and we show that unlike usual software, phishing attacks tend to be derived from a small set of master versions, and even the most active attacks in our database only go through a couple of iterations on average over their lifespan. We also show that phishing attacks tend to evolve independently from one another, without much cross-coordination.
机译:所谓的“网络钓鱼攻击”是指将钓鱼网站伪装成合法网站,以窃取敏感信息的攻击。我们之前的研究表明,有时经过小的修改后,网络钓鱼攻击往往会重新启动许多次。在本文中,我们将详细研究这些修改及其随时间的演变。我们提出了一个称为“半完全链接”(SCL)图的模型来进行评估,并且表明与常规软件不同,网络钓鱼攻击往往源自一小套主版本,甚至是最活跃的攻击。我们的数据库在整个生命周期内平均只会经历几次迭代。我们还表明,网络钓鱼攻击倾向于相互独立发展,而没有太多的交叉配合。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号