Survey of Anti - Phishing Tools With de Capabilities Etection
Survey of Anti - Phishing Tools With de Capabilities Etection
Abstract— Phishers have been continually chaanged their tricks services, social networks and onlinee governmental organizations
and emerged novel variants for more security viollations and causes respectively and cause dramatically y increased financial losses [1,
of monetary losses in business organizations. Th he lack of existing 2, 10-13], as presented in Fig. 1(c).
anti-phishing solutions considered as an optimum m anti-phishing is
because of detection incapability specifically again nst novel phishes.
This paper classifies the existing anti-phishing toools, identifies their Volumes Growth of Phishing Websites by Year
detection incapability against several kinds of n novel phishes and
underscores the issues behind this problem. Further it suggests next Phishing
500000
wave of research to solve it. Targeting academ mic and industry Websites
400000
researchers, this paper provide a valuable source of information to
300000
contribute the cyberspace with new products and fulfill the security
200000
flaws.
100000
0
Keywords- Internet phishing; anti-phishing; deetection capability;
novel phishes. 2010 2011 2012 2013
2
I. INTRODUCTION (a)
Recently, Internet phishing is one of the most profitable
cyber-crime in cyberspace. Internet phishing iss exploiting web Advancement of Phishing Activitty Trends
applications’ vulnerabilities and social enginneering; phishers New URLs
250
disguise the reliable and sensitive transactionns of users’ and
200
identity theft by impersonating the legitimaate websites or 150
Embedded
objects-based
delivering phishing emails [1-4]. For its mitigatiion, various anti- 100 phishes
phishing tools have been proposed in the lastt few years from 50
XSS-based phishes
215
III. ISSUES AND FUTURE TRENDS
Based on the literature, almost researchers investigated Regarding to Appendix Table II and Fig. 2, almost surveyed
issues behind the detection accuracy and computational cost of anti-phishing tools fall shortly in detecting novel phishes. More
existing anti-phishing tools and conducted more researches to importantly, they analyze phishing attacks by using design
improve them towards obtaining optimum anti-phishing features and mechanisms that cannot leverage well those
campaigns. However, they rarely addressed issues behind exploited by novel phishes and have not yet been identified. And
detection incapability of some notably effective anti-phishing they come up well with language dependent features like term
tools against novel phishes which becomes a bottleneck of the frequency-inverse document frequency (tf-idf) features, text
existing anti-phishing campaign [3, 5, 11, 17, 18]. Phishers categorization and some language processing algorithms, and
frequently change their behaviours and activities to avoid ready-made frequency lists of keywords that are best suited for
existing anti-phishing campaigns whenever they exploit novel some specific languages such as English language [18, 19, 21,
phishes such as XSS-based, embedded object-based and new 22, 25, 42]. Particularly, they utilize data sets consists of
phishes hosted in any language-based websites that have not yet websites hosted English language rather than other languages.
identified before by existing anti-phishing campaign. XSS-based Thus, phishers can easily defeat them by exploiting these gaps
phishes deploy XSSVs and obfuscated scripts for malware and deliver new variants of attacks that have not yet been
delivery. Embedded object based phishes imitate embedded analyzed before. For example, heuristics-based anti-phishing
components of web content such as Applets, Flash objects, tools mostly relied on term frequency-inverse document
ActiveX objects and advertising banners for advanced frequency (tf-idf) features and text categorization, which are
deceptions. On the other hand, newly emerged phishes can language dependent features and mechanisms. Thus, they can
deploy some non-English language websites which have not yet effectively detect phishing websites made up with their own
been analyzed and identified for hostage [19, 22, 25, 42]. Based adapted heuristics only [18, 22, 42]. Similarly, hybrid-based
on the literature, Table II in Appendix reviews the detection anti-phishing tools lack of analyzing webpages made up of
capability of some notable anti-phishing tools in terms of images, flash objects, applets, ActiveX objects and external
language independence, XSS-based and embedded objects- hyperlinks. Furthermore, they rarely leverage obfuscated client
based phishes. side scripts that could be probably injected by phishers for
malware delivery [22, 42].
In Table II of Appendix, the anti-phishing tool of [7] lacks
leveraging XSS vulnerabilities of web browsers, and images, With respect to these aforesaid issues, the detection
scripts, flash and ActiveX objects in the webpage source code capability of existing anti-phishing tools against novel phishes
for imitation and obfuscation. Most of the heuristics-based anti- can be mainly considered along with detection accuracy as
phishing tools such as those proposed in [25, 31, 34], rarely major concerns of research progress. We suggest that the
leveraged novel phishes. Likely, hybrid based anti-phishing ongoing research should focus in the facets of detection
tools scarcely tolerate with novel phishes and phishes hosted in capability such as exploring new variants of features and
any language dependent website such as CANTINA+ [35]. deploying more sophisticated ones including embedded
Furthermore, information flow-based anti-phishing tools such as components, XSS-based features and client side scripting such
those in [37-39], are detectible against any language-hosted as Java Scripts, PHP and ASP as well as unlimited keywords
phishing websites but they still can be bypassed by XSS-based lists and language independent features which can be suitable for
and embedded objects-based phishes. Fig. 2 illustrates the state any natural language rather than English like eastern languages
of the art comparison of anti-phishing tools. (Chinese and Arabic). In addition, new detective strategies with
the aid of multifaceted computational science algorithms and
techniques for content extraction and features similarity
assessment should be emerged to leverage well novel phishes
Detection Capabilities of Anti-phishing Tools due to Detection
Approaches
hosted in both websites and emails. At last, next wave of
researches must be conducted to improve existing anti-phishing
90% Language
Independent
campaigns for wider scale detection of phishing attacks and
80%
provide essential factors to meet these issues.
70%
60% Embedded
Objects
50% Based
Phishes
40%
30% XSS Based
Phishes
20%
10%
0%
List-based solutions
Heuristic-based solutions
Hybrid-based solutions
Information-based solutions
217
[33] Y. Zhang, "Cantina: a content-based approach to detecting phishing web [35] G. Xiang, "CANTINA+: a feature-rich machine learning framework for
sites," Proc. 16th Int. Conf. World Wide Web, Acm, pp. 639–648, May detecting phishing web sites," ACM Trans. Inform. Syst. Security (tissec),
2007. vol. 2, no. 14, 2011.
[34] S. Gastellier-prevost, "Decisive heuristics to differentiate legitimate from [36] H.M. Fahmy, & S.A. Ghoneim, "PhishBlock: A hybrid anti-phishing tool,"
phishing sites," IEEE 2011 Conf. Network Inform. Syst. Security (sar-ssi), 2011 Ieee Int. Conf. Comm., Comput. Control Applications (ccca), pp. 1–
pp. 1–9, May 2011. 5, Mar. 2011.
[37] C. Yue & H. Wang, "BogusBiter: a transparent protection against phishing [40] N. Witte, "Rating the Authenticity of Websites," 16th Twente Student
attacks," Acm Trans. Internet Technology, College William Mary, vol. 10, Conf. It , Jan 2012.
no. 2, 2010. [41] R.B. Basnet, "Rule-based phishing attack detection," Int. Conf. Security
[38] H. Shahriar, "PhishTester: automatic testing of phishing attacks," Secure Management (sam 2011), Las Vegas, Nv., 2011.
Software Integration and Reliability Improvement (ssiri), June 2010. [42] R. Gowtham, "A comprehensive and efficacious architecture for detecting
[39] Y. Joshi, "PhishGuard: A browser plug-in for protection from phishing," phishing webpages," Computers & Security, vol. 40, pp. 23–37, 2014.
IEEE 2nd Int. Conf. Internet Multimedia Services Architecture
Applications,imsaa 2008, pp. 1–6, Dec. 2008.
APPENDIX
TABLE I. NOTABLE ANTI-PHISHING TOOLS WITH THEIR RELATIVE MERITS
PhishGuard [39] 2008 Information flow Plug-in Website filter Browser Independent Client-side
B-APT [6] 2008 Whitelist Toolbar URL filter Mozilla Firefox Server-side
BogusBiter [37] 2010 Information flow Toolbar Website filter Browser independent Client-side
PhishTester [38] 2010 Information flow Toolbar Website filter Internet Explorer7 Client-side
PhishCatch [25] 2010 Heuristics Plug-in Email filter Browser Independent Client-side
McAfee Site 2010 Hybrid Extension Website filter McAfee Anti-virus Client-Server
Advisor [13, 37]
PhishNet [32] 2010 Blacklist Toolbar URL filter Google Client-side
PhishBlock [36] 2011 Hybrid Toolbar Website filter Mozilla Firefox, Client-side
Internet Explorer
Google Toolbar 2011 Heuristics Toolbar URL / Gmail filter Google Client-side
[31]
PhishShark [34] 2011 Heuristics Toolbar Website filter Browser Independent Client-side
218
TABLE II. DETECTION CAPABILITY OF ANTI-PHISHING TOOLS IN TERMS OF XSS-BASED AND EMBEDDED OBJECTS-BASED PHISHES
AS WELL AS LANGUAGE INDEPENDENCE
219