Title: ClientSide defense against webbased identity theft
1Client-Side defense against web-based identity
theft
- Presented by Mikin Macwan
- Special Topics in Operating systems and
Distributed storage
2Typical Phishing Characteristics
Link as Seen by User
Scam Email
3Typical Phishing Characteristics
Honest Image
Confidential information
4Typical Phishing Characteristics
5Terminology
- Spoof site site or page which is a malicious
copy of some legitimate web page - Attacker the person or organization who sets up
the spoof site - Honest site or honest page the legitimate site
or page that is being spoofed - Spoof Index A measure of the likelihood that a
specific page is part of a spoof attack
6Proposed Solutions
- Proposed Solutions to detect spoof pages from
honest pages 1 - Scoring
- Described in the next slide
- Stateless page Evaluation
- Includes tests conducted on the current web page
only - Stateful page evaluation
- Browser History file and additional history
stored by SpoofGaurd are used to evaluate the
referring page - No warnings issued for visiting a site that is
already in the users history file - Evaluating post data
- User input intercepted by SpoofGaurd and html
post data is checked - Actual client data post allowed to proceed only
if spoof index is below the user specific
thresholds for posts - Stateful and stateless Page checks are combined
with the analysis of the post data to determine
the spoof index associated with the web page.
7Solutions Scoring
- Input
- Downloaded web page
- Existing browser state
- Apply
- Tests T1, T2, , Tn
- Each test Ti produces number Pi
- Pi is in the range 0,1 (Pi 1 spoof page, Pi
0 honest page) - Combine test results to generate a Total Spoof
Score - Product PiPjPk
- Considers combinations of events and determine
likelihood of a page being a spoof - Example Consider the following condition
- Presence of company logo on unauthorized page AND
- Presence of password and credit card fields
8Solutions Stateless page evaluation (1/2)
- URL check
- Attackers can produce misleading URLs
- Consider the following URL
- http//dont-care_at_www.my-scam.org/my-phish-page.ht
m - Text in blue lies between http and _at_.
Everything between http and _at_ is irrelevant - Text in red is relevant and is the valid URL
- Image check
- Spoof sites contains images taken from the honest
site. - Honest site images used in phish sites give an
impression to unsuspecting users that they are
communicating with the honest site itself - SpoofGaurd plug-in supplied with a database
images with their associated domains - When browser downloads login page, all images on
the page are compared to images stored in the
spoof guard database - Spoof score increased if a match is found but the
pages domain is not valid
9Solutions Stateless page evaluation (2/2)
- Link check
- All links within a page are examined
- Link check fails for a page if at least one
fourth of the links fail the URL check described
above - Password check
- A page is considered suspicious if it asks for a
user to enter some password. - Also check if secure http is being used and if so
whether the certificate check succeeded or failed
10Solutions Stateful page evaluation (1/1)
- Domain check
- SpoofGaurd currently compares domains by Hamming
(edit) distance - Example
- efrade.com considered as a spoof domain name
- Etrade.com considered as a legitimate domain
name - Hamming distance - ONE
- Another Example
- Cnn.com is a legitimate domain name
- Cnnfn.com is flagged by SpoofGaurd as spoof
page - Caveat
- Outsourced web pages to contractors with
different domain names. - Leads to false alarms in current version of
SpoofGaurd - Referring Page
- Browser maintains a record of the referring page.
- Since a typical web spoofing attack begins with
an E-mail message, a referring page from a web
site where the user may have been reading e-mail
raises suspicion levels
11Solutions Evaluating post data
- Outgoing password check
- Spoofguard maintains a database of name, password triplets
- Is user reuses password on a new domain, this
trips password check - Interaction with image check
- Image check interacts with the outgoing password
check non-linearly. - If E-trade password is entered on a non E-trade
page containing an E-trade logo then spoof index
is raised. - Check of all post data
- All outgoing post data is checked by SpoofGaurd.
- Exception for search engines
12SpoofGaurd Architecture
CWindowImpl class implementations
COM Component extends IDeskBand (IE Interface)
13Spoof Guard Architecture
- Implemented as a browser plug-in or a browser
helper object (COM component) - SpoofGaurd runs in the same memory context as the
browser - Access is made to the IE history file
- Three additional files are stored
- Read-only file of hostnames of E-mail sites like
Hotmail, Yahoo! Etc - Hashed password history (domain, user name,
password) - File of hashed image history
14Spoofguard Configuration
15SpoofGuard in Action
16Server Side Assistance Confidentiality Tags
- Confidentiality Tags
- Add a confidentiality attribute to the
html element - This will help SpoofGuard to determine how to
process the field and thus warn the user - Possible confidential fields can be Name,
Password, SSN etc.
17Server Side Assistance Image Tagging
- Add a new attribute to IMG element in HTML page
- Enables honest sites to identify images on their
pages that are not supposed to appear outside
their domain - SpoofGuard attribute indicates that a page is a
likely spoof if the image appears on a non honest
web page
18Server Side Assistance Password Hashing and Site
Specific Salt
- Attackers break into a low security site and
recover logins and passwords - They then use this information to break into more
secure sites - Passwords can be made independent of passwords at
other sites by adding a password SALT to the html
element - Site developers need to ensure that salt is
unique for that web site
19Evaluation
- SpoofGuard evaluated based on the following
criteria - Detection of Spoof Attacks
- Tested SpoofGuard on 14 spoof pages (sent US
Secret Service) - Default settings were used to obtain SpoofGuard
messages - All fourteen spoof pages had password input
fields 100 detection - Pages included images, retrieved directly from
honest servers. Images were stored in SpoofGuard
image file as a result of initial navigation to
that site. - Mock sign in on spoof page using hello and
test, the same pair used on the honest eBay
site during the initialization part of the
experiment - False alarm rate
- How difficult is it to write a spoof page that is
not detected by SpoofGuard?
20Security
- Attacker can circumvent current tests proposed
- Password comparisons could fail
- Attacker could fool tests by breaking the
password input field into 2 or more adjacent
fields that appear contiguous - Images could be sliced and uploaded on spoof web
pages - These individual slices do not match images in
the plug in database, but to the user this image
would appear authentic - Although there are limitations, authors claim
that it is difficult for attackers to set up
spoof web sites
21Performance
- Tests were conducted on a
- 1 GHz Pentium III with 128 MB RAM
- 10 Mbps Ethernet Card
- 779 milliseconds to navigate from one page to
another without SpoofGuard, with cache 484
milliseconds - 911 milliseconds to navigate from one page to
another with SpoofGuard, with cache 601
milliseconds - CPU usage was 30 without SpoofGuard and 40 with
SpoofGuard
22Pros Cons
- Pros
- A new direction in the area of web spoofing
- Implementation of Software, provides proof of
concept - Software functionality does not cause high
overhead - Cons
- Some techniques may not be foolproof
- Server side assistance techniques requires
collaboration with E-commerce sites - User Interface may be a little annoying
- Users may not be sufficiently educated to set the
right threshold parameters to detect spoofs
23References
- N.Chou, R. Ledesma, J. Mitchell et.al. Client
Side defense against web-based identity theft. - Anti-Phishing Working Group
www.antiphishing.org