Cutting through the confusion: a measurement study of homograph attacks

作者: Steven D. Gribble , Tobias Holgers , David E. Watson

DOI:

关键词: PhishingTrace (semiology)UnicodeSpoofing attackCharacter (computing)TyposquattingComputer scienceWorld Wide WebDomain (software engineering)Homograph

摘要: Web homograph attacks have existed for some time, and the recent adoption of International Domain Names (IDNs) support by browsers DNS registrars has exacerbated problem [Gabr02]. Many international letters similar glyphs, such as Cyrillic letter P (lower case 'er,' Unicode 0x0440) Latin p. Because large potential misuse IDNs, browser vendors, policy advocates, researchers been exploring techniques mitigating [=Mozi05, Appl05, Oper05, Mark05]. There plenty attention on recently, but we are not aware any data that quantifies degree to which currently taking place. In this paper, use a combination passive network tracing active probing measure several aspects homographs. Our main findings four-fold. First, many authoritative sites users visit confusable domain names registered. Popular much more likely domains Second, registered tend consist single character substitutions from their domains, though saw instances five-character substitutions. Most confusables homographs, did find non-trivial number IDN Third, associated with non-authoritative most commonly show advertisements. Less common functions include redirecting victims competitor spoofing content site. Fourth, during our nine-day trace, none 828 clients observed visited site. Overall, measurement results suggest rare severe in nature. However, given increases phishing incidents, seem like an attractive future method attackers lure spoofed sites.

参考文章(7)
John C. Mitchell, Neil Chou, Yuka Teraguchi, Robert Ledesma, Client-Side Defense Against Web-Based Identity Theft. network and distributed system security symposium. ,(2004)
Markus Jakobsson, Modeling and preventing phishing attacks financial cryptography. pp. 89- 89 ,(2005) , 10.1007/11507840_9
Rachna Dhamija, J. D. Tygar, The battle against phishing: Dynamic Security Skins symposium on usable privacy and security. pp. 77- 88 ,(2005) , 10.1145/1073001.1073009
G. Goth, Phishing attacks rising, but dollar losses down ieee symposium on security and privacy. ,vol. 3, pp. 8- ,(2005) , 10.1109/MSP.2005.21
Evgeniy Gabrilovich, Alex Gontmakher, The homograph attack Communications of the ACM. ,vol. 45, pp. 128- ,(2002) , 10.1145/503124.503156
Edward W. Felten, Drew Dean, Dan S. Wallach, Dirk Balfanz, Web Spoofing: An Internet Con Game ,(1997)
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min, Xiaotie Deng, Detection of phishing webpages based on visual similarity Special interest tracks and posters of the 14th international conference on World Wide Web - WWW '05. pp. 1060- 1061 ,(2005) , 10.1145/1062745.1062868