Title: TWISC 96 PHISHING DETECTION AND WEB 2'0 SECURITY
1TWISC ????96????????PHISHING DETECTION AND WEB
2.0 SECURITY
- ?????? (Ieng-Fat Lam)
- ?????????
2OUTLINE
- Research Subjects
- Progress Report
- Future Progress
3RESEARCH SUBJECT
- Anti-Phishing
- Social Network System Security
4ANTI-PHISHING
- There are over 65 billions Internet users around
the world - And the number still growing.
- More service provided based on Internet access
- But also introduced the crisis of information
exposure. - Phishing is a special problem among Internet
security issues - The loss it causes is huge
- Heavily related to how Internet users trust a web
site
5ANTI-PHISHING (CONT.)
- Phishing is
- A type of semantic (???) attack
- Victims are sent emails that deceive them into
providing - Account numbers
- Passwords
- Other personal information (ex. Credit Card No)
- Falsely claim to be from a reputable business
where victims might have an account - Victims are directed to a spoofed web site
6GENERAL PHISHING ATTACK
7GENERAL PHISHING ATTACK (CONT.)
8GENERAL PHISHING ATTACK (CONT.)
- Phishing VS Original Website - eBay
9ANTI-PHISHING (CONT.)
- We argue that
- Phishing and Web spoofing is threatening
- Corresponding attacks target non-cryptographic
components - The implementations of existing cryptographic
security protocols - Do not provide a complete solution.
- These protocols must be complemented by
additional protection mechanisms.
10SOCIAL NETWORK SYSTEM SECURITY
- Social network systems
- Like Flickr, Myspace and Yahoo! 360
- Becomes popular these days
- People share personal information such as
- Video
- Audio
- Photographs
- On the web though social network systems
- Information on the web can be used by stranger
for any purpose - Without notification
11SOCIAL NETWORK SYSTEM SECURITY (CONT.)
- We focus on
- Privacy and security of social network systems
- Self information disclosure
- Especially on name leakage (non-self disclose)
- Measurement on existing social network system
- Wretch, the most popular SNS on Taiwan
- To identify the privacy and security risk in
online social network - In a quantify method.
12EXAMPLE OF NAME LEAKAGE
13EXAMPLE OF NAME LEAKAGE (CONT.)
14PROGRESS REPORT
- Overall Progress
- Research Result
15OVERALL PROGRESS
- Anti-Phishing
- Have a knowledge of how phishing works
- Existing mechanisms and their good / weak point
- Have written a program to collect Phishing
web-page everyday - Confirmed research direction
- Phishing detection based on Visual Similarity
- Phishing page classify program
- Implemented Phishing detection method by paper
(EMD)
16ANTI-PHISHING - SOME RESULTS
- Phishing page match to target
17ANTI-PHISHING - SOME RESULTS
- Phishing EMD result report
18OVERALL PROGRESS
- Social network system security
- Gathered data from Wretch
- Analyzed the data and prepared graph and table
- Found the cause and risk of name leakage
- Completed writing paper
- Measuring Name Leakage in Web 2.0 Social Network
Systems - Research is almost completed
19SNS SECURITY - SOME RESULTS
20RESEARCH RESULTS
- Anti-Phishing
- Using Visual Similarity need to care about
efficiency - The Method mentioned by Paper is not detailed in
implementation - Some bugs needed to be cleared
- Social Network System
- In the data set
- 28 of user full name can be inferred
- 70 of user first name can be inferred
- Risk of name leakage
- Cause of name leakage
21SOCIAL NETWORK SYSTEM THE PAPER
- Wretch data
- Gathered from September to November, 2007
- Total user 766972 (about 20)
- Average in-degree 6.49
- Average out-degree 6.52
22GENDER, AGE DISTRIBUTION
23RATIO OF SELF-DISCLOSURE
24RATIO OF NAME LEAKAGE
Ratio of user can infer a name
25RATIO OF NAME LEAKAGE
- Degree of Using Real name (DUR)
- The degree of friend description written by
specific user which contains a real name. - Cause of name leakage
- Degree of Call by Real name (DCR)
- The degree of description to specific user which
contains real name - Result of name leakage
26DUR, DCU WITH IN AND OUT DEGREE
27CAUSE OF NAME LEAKAGE
- The consistently lower of DUR
- Increased by increase of in and out degree
- User may not use friends' real name in
description as a usual practice. - Consistently high DCR
- Do not effect much by in and out degree
- Some user may regularly described by friends
using real name. - Real-world friends starts using real name.
28DUR, DCU WITH DEGREE OF SELF-DISCLOSURE (DSD)
29DCR AND DUR OVER DSD
- DSD do not have significant relation
- With both DUR and DCR
- Suggests that self-disclosure may not the cause
of result of name leakage.
30RISK OF NAME LEAKAGE
- Spam email
- Spam email by friends
- Evolved email list
- Using friends real name or email address
- Personalized Phishing Attack
- Using real name in Phishing email
31FUTURE PROGRESS
32FUTURE PROGRESS
- Anti-Phishing
- The code is taken over by other research
assistant - May continue assist on Phishing detection or
create a new topic - Social network system security
- The paper is needed to be finalized
- Grammar mistake
- Reviewed again by advise-professor
- Submit to conference or journal.