browser. The proposed approach is made up of 3
components: DNS TXT record to store the
legitimate entity’s certificate; one-way hash
algorithm; and client/server plug-in to verify the
authenticity of both online entities and users.
This paper is organized as follows. Section 2
introduces related work and contrasts it with the
approach in this paper. Section 3 discusses the
proposed approach. Finally, conclusions and future
work are summarized in section 4.
2 RELATED WORK
This section enumerates some of the known anti-
phishing techniques. It’s meant to provide a brief
overview of some of the best known efforts in this
area of research. Anti-phishing techniques fall into 4
major categories: content filtering, blacklisting,
symptom-based prevention, & domain binding.
Content/email filtering relies on machine learning
methods, such as Bayesian Additive Regression
Trees (BART) or Support Vector Machines (SVM),
to predict and filter phishing emails (Abu-Nimeh et
al., 2007; Fette, Sadeh, and Tomasic, 2006). Since
email is normally the first step in a phishing attack,
the advantage of this technique is that it intercepts &
eliminates suspected phishing emails before they
reach the user. Contents of the email, the
sender/source, and other attributes are analyzed by
this technique. The main disadvantage of this
technique is that it cannot guarantee that all phishing
emails are filtered (Wu, Miller, and Little, 2006).
Phishers have come up with alternative semantics
that are capable of bypassing these filters. Phishers
have also in certain cases resorted to the use of
images instead of text, which makes the filtering
process more challenging. It’s important to note that
while the majority of phishing attacks are initiated
by email, there has been a surge of new types of
attacks that are initiated by instant messaging or by
hacked Web pages. These types of attacks cannot be
intercepted by email-based solutions.
Blacklisting depends on public lists of known
phishing Web sites/addresses published by trusted
entities such as (Phishtank, 2008). It requires both a
client & a server component. The client component
is implemented as either an email or browser plug-
in. that interacts with a server component, which in
this case is a public Web site that provides a list of
known phishing sites. In the case of an anti-
phishing email plug-in, the client component
compares URLs embedded in every incoming email
to one or more publicly provided lists of suspected
phishing sites. Should it find a match, the email is
either discarded or flagged as a phishing/spam
email. In the case of an anti-phishing browser plug-
in, the client component compares every URL
loaded into the address field of the browser to one or
more publicly provided lists of suspected phishing
sites. Should it find a match, a warning message, in
the form of a popup window is displayed. The
advantage of this technique is the ability of the plug-
in to reference a frequently updated, reliable public
list of known phishing Web sites. This technique
however, suffers from many of the same problems as
signature-based prevention methods—almost always
outdated as phishers continuously use new Web sites
and addresses. In fact most phishing Web sites are
only available online for few hours (Zhang, Hong,
and Cranor, 2007). It’s important to note that
blacklisting have, in certain cases also been used as
a component/step in email filtering solutions since it
runs as an email plug-in in most cases.
Symptom-based prevention analyses the content
of each Web page the user visits and generates
phishing alerts according to the type and number of
symptoms detected (Chou et al., 2004). Symptoms
generated are the result of parsing the contents—text
of the Web page and the URL/address. Symptom-
based prevention uses learning and identification
techniques similar to email filtering such as SVM
and BART. The difference between the two
techniques is that one operates on the contents of the
email, while the other operates on the content of the
Web page being visited. It’s important to note that
unlike email-based filtering, both symptom-based &
blacklisting techniques are not invoked until after
the user presses Web link contained in the email.
The advantage of this technique is that it parses the
content of the visited Web site using machine
learning techniques to conclude whether it’s a
phishing site. This technique may provide a higher
level of detection rate since it parses the content of
the actual visited site and not just the text in the
phishing email. Disadvantages of this technique
include its inability to detect phishing attacks that
use client-side JavaScript and its reliance on warning
messages, which have proven ineffective with most
users (Wu, 2006). It’s important to note that this
technique should be viewed as complementary to
rather than competing with email-based phishing
techniques. The combination of both methods may
enable a defence in depth strategy.
Trusted domain binding is a browser-based
technique that binds sensitive information—mostly
credentials—to a specific domain (Raffetseder,
Kirda, and Kruegel, 2007). Should the user enter
SECRYPT 2009 - International Conference on Security and Cryptography
370