AAAI Proceedings Template

AAAI Proceedings Template

Kendal, Simon (2012) Selected Computing Research Papers Volume 1 June 2012. Selected Computing Research Papers . University of Sunderland, Sunderland. Downloaded from: http://sure.sunderland.ac.uk/id/eprint/9586/ Usage guidelines Please refer to the usage guidelines at http://sure.sunderland.ac.uk/policies.html or alternatively contact [email protected]. Selected Computing Research Papers Volume 1 June 2012 Dr. S. Kendal (editor) Published by the University of Sunderland The publisher endeavours to ensure that all its materials are free from bias or discrimination on grounds of religious or political belief, gender, race or physical ability. This material is copyright of the University of Sunderland and infringement of copyright laws will result in legal proceedings. © University of Sunderland 2012 Authors of papers enclosed here are required to acknowledge all copyright material but if any have been inadvertently overlooked, the University of Sunderland Press will be pleased to make the necessary arrangements at the first opportunity. Edited, typeset and printed by Dr. S Kendal University of Sunderland David Goldman Informatics Centre St Peters Campus Sunderland SR6 0DD Tel: +44 191 515 2756 Fax: +44 191 515 2781 Contents Page An Evaluation of Anti-phishing Solutions (Arinze Bona Umeaku) ..................................... 1 A Detailed Analysis of Current Biometric Research Aimed at Improving Online Authentication Systems (Daniel Brown) .............................................................................. 7 An Evaluation of Current Intrusion Detection Systems Research (Gavin Alexander Burns) .................................................................................................... 13 An Analysis of Current Research on Quantum Key Distribution (Mark Lorraine) ............ 19 A Critical Review of Current Distributed Denial of Service Prevention Methodologies (Paul Mains) ............................................................................................... 29 An Evaluation of Current Computing Methodologies Aimed at Improving the Prevention of SQL Injection Attacks in Web Based Applications (Niall Marsh) .............. 39 An Evaluation of Proposals to Detect Cheating in Multiplayer Online Games (Bradley Peacock) ............................................................................................................... 45 An Empirical Study of Security Techniques Used In Online Banking (Rajinder D G Singh) .......................................................................................................... 51 A Critical Study on Proposed Firewall Implementation Methods in Modern Networks (Loghin Tivig) .................................................................................................... 57 An Evaluation of Anti-phishing Solutions Arinze Bona-Umeaku Abstract Phishing as an online threat has resulted in the development of currently available anti-phishing solutions. Most of these solutions are automated web-based tools that warn users against phishing sites and protect users from third party invasion on their details when accessing a genuine website. In this paper we closely evaluate the performance of a web content system and a password protection system using documented evidence to summarize findings and offer a proposed solution. 1 Introduction 2 Web Content Systems One of the major internet threats is phishing. Phishing which has turned out to be a major 2.1 Anti-phishing Toolbars problem in the advancement of e-commerce In respect to this paper where we evaluate bringing doubts to the minds of customers on automated phishing solution, research has been the use of internet as a business tool. It has been done in the area of automated anti-phishing noticed that phishing attacks progressively detection solution for example the spoofguard increases year after year, (Chen et al. 2011) this (Zhang et al. 2007) which checks the website for has also been seen in more recent attacks against certain characteristics like the host name, Sony‟s Play station network and Epsilon. This traceable spoofing techniques and checking has resulted in several businesses and against previously marked images. Various organisations investing substantial amount of software vendors have developed anti-phishing research to find lasting solution (APWG, 2011). tool bars that identify a page as a phishing site For example companies like Cyveillance anti- or legitimate site using methods of blacklisting phishing is dedicated to providing anti-phishing (list of fake websites), whitelisting (list of solutions to organisations to enable them genuine websites) and user ratings (Cao et al. prevent, detect and recover from phishing 2008). Some of such examples are outlined attacks. Some software vendors offer toolbars below; Google makes available the source code that help users identify genuine sites (Zhang et for the safe browsing feature and claims that it al. 2007). cross-checks URLs against a blacklist. E-bay also developed a toolbar that uses both In this paper we evaluate methods that have heuristics and blacklists to identify fraudulent been proposed through series of research and URLs, It was also developed in a way were how they have performed towards the anti- users can report newly identified fraudulent phishing crusade. Among other methods sites. In internet explorer Microsoft also mentioned here we would take a close look at embedded a phishing filter which uses heuristics two systems, a content web-based automated as well as depends largely on the blacklist system and an authentication system that hosted by Microsoft and option for users to prevents a preset password. After which a report suspected sites. The Netcraft toolbar practical solution from evaluations made, based which was built to use a log of blacklisted on tangible evidence, implementation and tests websites hosted by Netcraft and a list of sites that has been carried out in previous research identified by users but confirmed by Netcraft. papers. 1 Having evaluated this using publicly available information provided by the toolbar download websites (APWG, 2011) it was discovered that majority of the tool bars mentioned above used blacklists to identify fraudulent sites, but not all Figure 1 were able to accurately identify phishing sites Where is number of phishing (Reddy, 2011). This could be as a result of the pages which are rightly labelled as phishing, and size of blacklist used by each toolbar therefore a is number of phishing pages. The list with more tagged and user updated sites will higher TP value the better the detector. While perform better than that with fewer list of false positive rate measures the percentage of phishing sites. Also the heuristics used could legitimate sites which are falsely labeled as have been used to detect other sites that have not positive phishing and it is computed by (Figure been put in the blacklist. Although spoofguard 2) (He et al. 2011). was the only tool bar that did not use blacklist instead it used heuristics still missed some phishing sites and had a high rate of false positive (genuine sites mistaken for fraudulent) this could probably be improved by the addition of whitelist (list of genuine sites) Figure 2 2.2 Automated Webpage Detector Where is number of Meanwhile the solution Presented here by (He et legitimate pages which are wrongly labeled as al. 2011) is a heuristic solution to determine if a phishing and is number of website is a genuine or a phishing page, based legitimate pages(He et al. 2011). This means on its content, HTTP transaction and search that when there is a lower FP value the betterr engine results. According to He et al (2011) this the detector. solution identifies phishing sites without using the blacklist technique. This is done by Experiment 1 converting a web page into 12 features which 100 login pages of top targeted legitimate are selected based on exisiting normal and websites (He et al. 2011) were collected. phishing page. This method claims to help users Another 100 webpages consisting the following identify a phishing website before it is were collected; blacklisted or shutdown as is the case with the 35 Homepage of top targeted websites, 35 Top blacklist-based anti-phisihng toolbar mentioned pages, 30 Random pages from a list of 500 above. Also claiming that the solution is able to pages used in 3Sharp‟s phishing study. (He et extract a webpage identity using the famous tf- al. 2011) idf (frequency-in-verse document frequency) From the 200 legitimate and 325 phishing method and this identity would be the basis for pages, 50 legitimate and 50 phishing pages as determing a phishing or legitimate webpage the training set. The 50 legitimate pages consist using an SVM (support vector machine) of: classifier. 10 login pages of top targeted websites 15 Homepages of top Alexa websites Two different experiments were conducted 10 Homepage of top targeted websites using two different testing data-set to evalute the 15 pages from 3Sharp list. method. There are two metrics used to evalute Therefore classification result is shown below the performance; true posititve(TP) rate and as: false posititve (FP) rate where the true positive True positive rate of the method is 97.33% and rate measures the percentage of phishing site false positive rate is low at 1.45%. Although which correctly labeled as positive phishing and most of the phishing pages used here were it is computed by (Figure 1) (He et al. 2011). already shutdown at the time of the test. Below

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    69 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us