SlideShare a Scribd company logo
1 of 5
Download to read offline
Jigar Rathod et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

URL Obfuscation Phishing and Anti-Phishing: A Review
Jigar Rathod, Prof. Debalina Nandy
M.tech (CE) Research Scholar, RK University, India.
Dept. of Computer Engg. RK University, India.

Abstract
Phishing is an internet fraud that acquires a user‘s credentials by deceptions. It includes theft of password, credit
card number, bank account details, and other confidential information. It is the criminal scheme to steal the
user‘s confidential data. There are many anti-phishing techniques used to protect users against phishing attacks.
The statistical of APWG trends report for 1st quarter 2013 says that now a day the maximum phishing attacks are
done using URL Obfuscation phishing technique. Due to the different characteristics and methods used in URL
Obfuscation, the detection of Obfuscated URL is complex. The current URL Obfuscation anti-phishing
technique cannot detect all the counterfeit URLs. In this paper we have reviewed URL Obfuscation phishing
technique and the detection of that Obfuscated URLs.
Keywords— Anti-phishing, Hyperlink, Internet Security, Phishing, URL Obfuscation
I. INTRODUCTION
Internet security is a branch of network
security specially related to the internet. Its objective
is to establish rules and standards to protect the
confidential data against attacks over the internet.
Phishing is a criminal mechanism employing both
social engineering and technical subterfuge to steal
consumer‘s personal data and financial account
information [1].
In simple word, the phishing means sending
an e-mail which contains some enticed data that lead
victims to counterfeit website and asking for sensitive
financial information. The spoofed e-mail is socially
engineered and a phisher convince the victim to
divulge confidential information such as financial
username and password, credit card number, bank
account details and other confidential information [1].
Anti-Phishing is a protection scheme in order to
detect and prevent phishing attacks. Anti-phishing
protects the user‘s credentials from the phishing
attacks. To protect the users against phishing attacks,
various anti-phishing techniques have been proposed
that follows different strategies like client side and
server side protection [2].
URL Obfuscation phishing attack misleads
the victims into thinking that a link and/or website
displayed in their web browser is legitimate. This
phishing attack tends to be technically simple but
highly effective [3]. There are several methods for
obfuscating the URL like bad domain name or
misspelled domain name, friendly login URL,
shortened URL, using IP address, encoded URL [4].
URL Obfuscation anti-phishing technique uses the
characteristics of URL and/or hyperlinks in order to

www.ijera.com

detect the phishing attacks [5]. The surveys of current
trends of phishing attacks encourage the researcher to
develop the more efficient algorithm. Because on the
base of APWG – phishing activity trends report, 1st
quarter 2013, we can analyse that the URL
Obfuscation phishing attacks are continuously
increasing.
II. APWG – PHISHING ACTIVITY

TRENDS SUMMARY (1ST
QUARTER 2013)
Statistical for 1st Quarter ‘13
The phishing activity trends report 2013
gives the statistical of the current phishing attacks [5].
In the figure 1 statistical, we can analyse that the URL
based phishing attacks is continuously increasing.
URL Obfuscation attacks increase from 50.03% in
January 2013 and 50.75% in February 2013 to
55.89% in March 2013. And with the using of IP
address instead of domain name it increase from 1.89
in January 2013 and 1.92% in February 2013 to
5.24% in March 2013 [5].
A.

Most Targeted Industry Sector ‘13
The phishing activity trends report 2013
gives the statistical of the currently most targeted
industry sector by phishing attacks.
In the figure 2 statistical, we can analyse that
the payment services are most targeted industry sector
with the 45.48% and then the financial sector are
targeted with the 23.95% attacks. So, we can say that
the maximum phishing attacks are focused on to get
the financial information.
B.

338 | P a g e
Jigar Rathod et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342

www.ijera.com

Figure 1: Statistical for the 1st quarter 2013.

Figure 2: Most Targeted Industry Sector 1st quarter 2013.
III. GENERAL STEPS FOR URL
OBFUSCATION PHISHING ATTACK
Generally, the URL Obfuscation phishing
attacks perform with the following four steps [2]:
1. First of all, the phisher have to make an
obfuscated URL website to lure the victims, and

www.ijera.com

2.

that URL and website must be seems as
legitimate one.
Then, that obfuscated URL is attached to the
lots of spoofed e-mails and sends to the number
of users. That e-mail will convince the victim to
click on that URL.

339 | P a g e
Jigar Rathod et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342
3.

If the victim clicks on that obfuscated URL and
visits that website, it convince the victim to
provide the financial information of some
confidential data.
Phisher then acquire some entered data or
information, and later it can be misused by
phisher.

4.

Figure 3: General Steps for URL Obfuscation
Phishing attack.
IV.

EXISTING METHODS FOR URL
OBFUSCATION PHISHING ATTACK

URL Obfuscation is a type of phishing
attacks, in this attack the obfuscated URL used
instead of real URL to dupe the victims. There are
several methods used for obfuscating the URL.
A.
Bad domain name or Misspelled domain
name:
One of the most trivial obfuscation
methods is through the purposeful registration and
use of bad domain name. Consider the financial site
RealBank has registered the domain name
realbank.com and associated customer transactional
site http://onlinebanking.realbank.com. The attacker
could set up any of similar domain name to
obfuscate the real destination host [4]. Like,
 http://realbankS.com
 http://realbamk.com
 http://onlinebanking.realbankS.com
 http://onlinebanking.realbamk.com
B.

Shortened URLs:
A shortened URL is short URL, which
minimize the length and the complexity of web
based application URL‘s. It is redirected to the
targeted URL. Shortened URL is a combination of
www.ijera.com

www.ijera.com

service site and unique number. The phisher may
use these free services to obfuscate the true
destination [6]. Such as,
 http://tinyurl.com,

http://bitly.com
 http://goo.gl
C.
Host name Obfuscation or Using IP
address:
In host name obfuscation method the host
name can also be obfuscated by replacing it with the
IP address of the same domain name. A phisher may
wish to use the IP address as part of a URL to
obfuscate the host and possibly bypass the content
filtering system or hide the destination from the end
user [4].
For example: the IP address for the
obfuscated
URL
http://realbankS.com
is
173.193.212.4. Then the above URL will be
obfuscated such as http://173.193.212.4/.
Most commonly the dotted IP address is
used by the phisher to obfuscate the URL. Like
instead of our misspelled domain name
realbankS.com we have use the IP address
173.193.212.4. There are the other formats also
available for the IP address such as dot less IP
address in decimal, dotted IP address in octal, dotted
IP address in hexadecimal, dot less IP address in
hexadecimal [7].
D.

Friendly Login URL:
Many web browsers allows for the URLs
that contain authentication information such as
username and password. The general format is
url://username:password@hostname/path. So, by
using this facility the attackers may proxy the
username and password field for targeted
organization.
For example: following URL sets the username =
onlinebanking and password = realbank.com and the
destination hostname is realbankS.com. So, the URL
looks
like
http://onlinebanking:realbank.com@realbankS.com/
fakepage.php. Through the above URL, user thinks
that they are visiting the legitimate onlinebanking of
realbank.com site. But truly they are visiting the
fake page of realbankS.com. That fake page will
resemble to realbank.com [8].
E.

Encoded URL Obfuscation:
In this method, phisher obfuscate the URL
using encoding schemes. It is trivial for the phisher
to obfuscate the true nature of URL using the
encoded schemes.

340 | P a g e
Jigar Rathod et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342
V. ANTI-PHISHING TECHNIQUE FOR URL
OBFUSCATION

Anti-phishing refers to the method
employed in order to detect and prevent phishing
attacks. To protect the users against phishing attacks,
various anti-phishing techniques have been
proposed that follows different strategies like client
side and server side protection [3].
From the various anti-phishing techniques, URL
Obfuscation anti-phishing technique used to keep
the user‘s data safe. To protect the user from
obfuscated URL various tools are available which
works on client side. And the existing algorithm
used to prevent this attack which works on server
side.
As the different characteristics used in
URL Obfuscation phishing attacks any single tool
are not capable to check all the characteristics of
URLs. The tools like EarthLink toolbar, Netcraft
anti-phishing toolbar, SpoofGuard toolbar produce
very high false positive results. They all are relying
only on blacklist and whitelist; it cannot identify the
URL if it is used IP address, Shortened URL or
encoded URL [9].
The LinkGuard algorithm works on server
side and it is then only one existing algorithm to
check the maximum characteristics of URL.
LinkGuard can detect known as well as unknown
URL Obfuscation phishing attacks. None of the
tools are perfect then LinkGuard algorithm at the
current stage of URL Obfuscation phishing attack
[10].
 LinkGuard is based on careful analysis of the
characteristics of phishing hyperlink or URL.
 Link has verified very low false negative rate
for the unknown phishing attacks.
Basically, LinkGuard algorithm works on the
hyperlinks. So, when the hyperlink will be
found in e-mail, the algorithm performs the
following steps:
A.

Visual DNS and Actual DNS:
LinkGuard first extract the DNS name
from actual and visual link. And then compare both
the name. If both the names are different then it
warns the user as phishing URL [10].
For example: if the hyperlink found in e-mail, then
if the actual DNS is http://www.paypal.com and the
visual DNS also same as actual DNS. Then, the
DNS test will declare the results as Both the DNS
are same.
B.

Dotted decimal IP address:
If dotted decimal IP address is directly used
in actual DNS, then it warns the user as phishing
URL. So, this test produces the false positive result.
Because, if any legitimate site uses their IP address,
www.ijera.com

www.ijera.com

LinkGuard algorithm will declare the results as
phishing URL [10].
For example: if the hyperlink found in e-mail, then
if the actual DNS is http://120.120.55.101/ and the
visual DNS is paypal, then it declares that hyperlink
or URL as phishing URL [10].
C.
Encoded URL:
If the actual link or visual link is encoded, the
linkguard algorithm first decodes the URL and
displays the actual URL then recursively call
linkguard to return the result.
For example: if the hyperlink found in e-mail, the
actual DNS is http%3A%2F%2Fpaypal-cgi.com and
the visual DNS is paypal. Then the URL encoded
test will decode the URL as http://paypal-cgi.com
and results as URL is encoded, phishing may be
possible.
D.

Analyse Domain Name :
When there is no destination information
(DNS name or dotted decimal IP address) is found
in visual link, linkguard call the analyse DNS to
analyse the actual DNS [10].
E.

Black List & White List:
Linkguard algorithm will check the URL in
blacklist and white list. If DNS name is contained in
blacklist, then we are sure that it is a phishing URL,
and results as blacklisted URL. And if DNS name
contained in whitelist we are sure that it is not
phishing URL, and results as white listed URL, no
phishing [10]. If DNS name is not identical in either
blacklist or whitelist, the pattern matching test will
be performing.
F.

Pattern Matching:
Pattern matching designed to handle
unknown phishing attacks. In this case the blacklist
and whitelist is useless. If two DNS name are
similar but not identical, then it is possible phishing
attack. For instance pattern matching can easily
detect the difference between both the DNS [10].
It checks the maximum likelihood of both the DNS
name. The similarity index between two strings is
determined by calculating the minimal number of
changes in strings.
For example: similarity index of ‗microsoft‘ and
‗micr0s0ft‘ is 7/9. Similarly, the similarity index of
‗paypal‘ and ‗paypal-cgi‘ is 6/10. Pattern matching
can easily detect the difference between
www.icbc.com.cn and www.1cbc.com.cn.
VI. CONCLUSION
URL Obfuscation is a critical issue now a
day. Several methods used in this attacks and
several mechanism works against this attacks but
341 | P a g e
Jigar Rathod et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342
still there are some challenges which needs to be
considered. So, there is likelihood to overcome these
drawbacks and try to make a solid algorithm that
may cover maximum URL Obfuscation phishing
attacks.

www.ijera.com

Journal for Scientific Research (IOSR), eISSN: 2278-0661, p-ISSN: 2278-8727,
Volume.14 Issue.3, Pages: 28-36.

REFERENCES

[1]
[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

Anti-phishing Working Group (APWG)
Official site, http://www.apwg.org
Gaurav, Madhuresh Mishra, Anurag Jain,
(March-April
2012)
―Anti-phishing
techniques: A Review‖ International
Journal of Engineering Research and
Application (IJERA), ISSN: 2248-9622,
Volume.2 Issue.2, Pages: 350-355.
Madhuri S. Arade, P.C.Bhaskar (June 2011)
―Anti-phishing Model with URL & image
based webpage Matching‖ International
Journal of Computer Science and
Technology (IJCST) ISSN: 2229-4333
(Print), 0976-8491 (Online), Volume 2,
Issue.2, Pages: 282-286.
Gunter Ollmann, Director of Security
Strategy, IBM Internet Security System.
―The Phishing Guide: Understanding &
Preventing Phishing Attacks‖.
Anti-Phishing Working Group (APWG) –
Phishing Activity Trends Reports 2013.
(July
2013).
http://docs.apwg.org/reports/apwg_trends_r
eport_q1_2013.pdf.
Soojin Yoon, Jeongeun Park, Changkuk
Choi, Seungjoo Kim (July 2013) ―SHRT:
new method of URL shortening including
relative word of target URL‖ Symposium
on usable privacy and Security (SOUPS)
July 24-26, 2013, Newcastle, UK.
P.Malathi, Dr.P.Vivekanandan (November2012) ―An efficient framework for internet
banking‖
International
Journal
of
Engineering Science and Research
Technology (IJESRT), ISSN: 2277-9655,
Pages: 545-551.
Dr.Marthie Grobler (August 2010)
―Phishing for Fortune‖ Information
Security for South Africa Conference,
Sandton, South Africa. 2-4 August 2010,
Pages: 8-15.
Lorrie Cranor, Serge Egelman, Jason Hong,
and Yue Zhang (November 2006)
―Phinding Phish: Evaluating Anti-phishing
Tools‖, CyLab Carnegie Mellon University.
U.Naresh,
U.Vidya
Sagar,
C.V.Madhusudan Reddy (Sep-Oct 2013)
―Intelligent Phishing Website Detection
and Prevention System by Using
LInkGuard
Algorithm‖
International

www.ijera.com

342 | P a g e

More Related Content

What's hot

Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attackMark Mair
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Editor IJMTER
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesSarim Khawaja
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...ijdpsjournal
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
Using OTP prevent Phishing attacks
Using OTP prevent Phishing attacksUsing OTP prevent Phishing attacks
Using OTP prevent Phishing attacksriteshsarode1995
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishingIJCSES Journal
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerceanshutomar6
 
Backup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonBackup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonFares Sharif
 

What's hot (19)

Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attack
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
Using OTP prevent Phishing attacks
Using OTP prevent Phishing attacksUsing OTP prevent Phishing attacks
Using OTP prevent Phishing attacks
 
Web application security
Web application securityWeb application security
Web application security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Data security
Data securityData security
Data security
 
Backup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonBackup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-Mon
 

Viewers also liked (20)

Motech
MotechMotech
Motech
 
Clube de Lideres
Clube de LideresClube de Lideres
Clube de Lideres
 
Livro as estações ana paula delavie proença
Livro as estações   ana paula delavie proençaLivro as estações   ana paula delavie proença
Livro as estações ana paula delavie proença
 
EventoUDOP
EventoUDOPEventoUDOP
EventoUDOP
 
Como y apps builder
Como y apps builderComo y apps builder
Como y apps builder
 
Profile_Bengal Indigoltd
Profile_Bengal IndigoltdProfile_Bengal Indigoltd
Profile_Bengal Indigoltd
 
Geração Bem Estar Jc
Geração Bem Estar JcGeração Bem Estar Jc
Geração Bem Estar Jc
 
Jose Jorge's 8 LtrsRec
Jose Jorge's 8 LtrsRecJose Jorge's 8 LtrsRec
Jose Jorge's 8 LtrsRec
 
Tutorial 1º acesso à comunidade Jovem SUS
Tutorial 1º acesso à comunidade Jovem SUSTutorial 1º acesso à comunidade Jovem SUS
Tutorial 1º acesso à comunidade Jovem SUS
 
Primeiros passos com dropbox
Primeiros passos com dropboxPrimeiros passos com dropbox
Primeiros passos com dropbox
 
GEO_ANI Project Overview
GEO_ANI Project OverviewGEO_ANI Project Overview
GEO_ANI Project Overview
 
L&F Zelda la Grange
L&F Zelda la GrangeL&F Zelda la Grange
L&F Zelda la Grange
 
Taller 9 ud iii tema 2
Taller 9 ud iii tema 2Taller 9 ud iii tema 2
Taller 9 ud iii tema 2
 
module for journalists
module for journalistsmodule for journalists
module for journalists
 
Uso responsable de las tic para prevenir las tic
Uso responsable de las tic para prevenir las ticUso responsable de las tic para prevenir las tic
Uso responsable de las tic para prevenir las tic
 
La RIEB
La RIEBLa RIEB
La RIEB
 
4 ps biología neurotransmisoresylasemociones
4 ps biología neurotransmisoresylasemociones4 ps biología neurotransmisoresylasemociones
4 ps biología neurotransmisoresylasemociones
 
Papo de audio aula fase e ondas
Papo de audio  aula fase e ondasPapo de audio  aula fase e ondas
Papo de audio aula fase e ondas
 
Diplom Excel expert
Diplom Excel expertDiplom Excel expert
Diplom Excel expert
 
spworksamples1
spworksamples1spworksamples1
spworksamples1
 

Similar to Bh4101338342

Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningIRJET Journal
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGHeather Strinden
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...csandit
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...cscpconf
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKScsandit
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESIJCNCJournal
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesIJCNCJournal
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing TechniquesIRJET Journal
 
Phishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelPhishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelIRJET Journal
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET Journal
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET Journal
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET Journal
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...IJECEIAES
 

Similar to Bh4101338342 (20)

Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine LearningPhishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHESPHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES
 
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning ApproachesPhishing URL Detection using LSTM Based Ensemble Learning Approaches
Phishing URL Detection using LSTM Based Ensemble Learning Approaches
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
Phishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelPhishing Detection using Decision Tree Model
Phishing Detection using Decision Tree Model
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different Types
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
 

Recently uploaded

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Bh4101338342

  • 1. Jigar Rathod et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342 RESEARCH ARTICLE www.ijera.com OPEN ACCESS URL Obfuscation Phishing and Anti-Phishing: A Review Jigar Rathod, Prof. Debalina Nandy M.tech (CE) Research Scholar, RK University, India. Dept. of Computer Engg. RK University, India. Abstract Phishing is an internet fraud that acquires a user‘s credentials by deceptions. It includes theft of password, credit card number, bank account details, and other confidential information. It is the criminal scheme to steal the user‘s confidential data. There are many anti-phishing techniques used to protect users against phishing attacks. The statistical of APWG trends report for 1st quarter 2013 says that now a day the maximum phishing attacks are done using URL Obfuscation phishing technique. Due to the different characteristics and methods used in URL Obfuscation, the detection of Obfuscated URL is complex. The current URL Obfuscation anti-phishing technique cannot detect all the counterfeit URLs. In this paper we have reviewed URL Obfuscation phishing technique and the detection of that Obfuscated URLs. Keywords— Anti-phishing, Hyperlink, Internet Security, Phishing, URL Obfuscation I. INTRODUCTION Internet security is a branch of network security specially related to the internet. Its objective is to establish rules and standards to protect the confidential data against attacks over the internet. Phishing is a criminal mechanism employing both social engineering and technical subterfuge to steal consumer‘s personal data and financial account information [1]. In simple word, the phishing means sending an e-mail which contains some enticed data that lead victims to counterfeit website and asking for sensitive financial information. The spoofed e-mail is socially engineered and a phisher convince the victim to divulge confidential information such as financial username and password, credit card number, bank account details and other confidential information [1]. Anti-Phishing is a protection scheme in order to detect and prevent phishing attacks. Anti-phishing protects the user‘s credentials from the phishing attacks. To protect the users against phishing attacks, various anti-phishing techniques have been proposed that follows different strategies like client side and server side protection [2]. URL Obfuscation phishing attack misleads the victims into thinking that a link and/or website displayed in their web browser is legitimate. This phishing attack tends to be technically simple but highly effective [3]. There are several methods for obfuscating the URL like bad domain name or misspelled domain name, friendly login URL, shortened URL, using IP address, encoded URL [4]. URL Obfuscation anti-phishing technique uses the characteristics of URL and/or hyperlinks in order to www.ijera.com detect the phishing attacks [5]. The surveys of current trends of phishing attacks encourage the researcher to develop the more efficient algorithm. Because on the base of APWG – phishing activity trends report, 1st quarter 2013, we can analyse that the URL Obfuscation phishing attacks are continuously increasing. II. APWG – PHISHING ACTIVITY TRENDS SUMMARY (1ST QUARTER 2013) Statistical for 1st Quarter ‘13 The phishing activity trends report 2013 gives the statistical of the current phishing attacks [5]. In the figure 1 statistical, we can analyse that the URL based phishing attacks is continuously increasing. URL Obfuscation attacks increase from 50.03% in January 2013 and 50.75% in February 2013 to 55.89% in March 2013. And with the using of IP address instead of domain name it increase from 1.89 in January 2013 and 1.92% in February 2013 to 5.24% in March 2013 [5]. A. Most Targeted Industry Sector ‘13 The phishing activity trends report 2013 gives the statistical of the currently most targeted industry sector by phishing attacks. In the figure 2 statistical, we can analyse that the payment services are most targeted industry sector with the 45.48% and then the financial sector are targeted with the 23.95% attacks. So, we can say that the maximum phishing attacks are focused on to get the financial information. B. 338 | P a g e
  • 2. Jigar Rathod et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342 www.ijera.com Figure 1: Statistical for the 1st quarter 2013. Figure 2: Most Targeted Industry Sector 1st quarter 2013. III. GENERAL STEPS FOR URL OBFUSCATION PHISHING ATTACK Generally, the URL Obfuscation phishing attacks perform with the following four steps [2]: 1. First of all, the phisher have to make an obfuscated URL website to lure the victims, and www.ijera.com 2. that URL and website must be seems as legitimate one. Then, that obfuscated URL is attached to the lots of spoofed e-mails and sends to the number of users. That e-mail will convince the victim to click on that URL. 339 | P a g e
  • 3. Jigar Rathod et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342 3. If the victim clicks on that obfuscated URL and visits that website, it convince the victim to provide the financial information of some confidential data. Phisher then acquire some entered data or information, and later it can be misused by phisher. 4. Figure 3: General Steps for URL Obfuscation Phishing attack. IV. EXISTING METHODS FOR URL OBFUSCATION PHISHING ATTACK URL Obfuscation is a type of phishing attacks, in this attack the obfuscated URL used instead of real URL to dupe the victims. There are several methods used for obfuscating the URL. A. Bad domain name or Misspelled domain name: One of the most trivial obfuscation methods is through the purposeful registration and use of bad domain name. Consider the financial site RealBank has registered the domain name realbank.com and associated customer transactional site http://onlinebanking.realbank.com. The attacker could set up any of similar domain name to obfuscate the real destination host [4]. Like,  http://realbankS.com  http://realbamk.com  http://onlinebanking.realbankS.com  http://onlinebanking.realbamk.com B. Shortened URLs: A shortened URL is short URL, which minimize the length and the complexity of web based application URL‘s. It is redirected to the targeted URL. Shortened URL is a combination of www.ijera.com www.ijera.com service site and unique number. The phisher may use these free services to obfuscate the true destination [6]. Such as,  http://tinyurl.com,  http://bitly.com  http://goo.gl C. Host name Obfuscation or Using IP address: In host name obfuscation method the host name can also be obfuscated by replacing it with the IP address of the same domain name. A phisher may wish to use the IP address as part of a URL to obfuscate the host and possibly bypass the content filtering system or hide the destination from the end user [4]. For example: the IP address for the obfuscated URL http://realbankS.com is 173.193.212.4. Then the above URL will be obfuscated such as http://173.193.212.4/. Most commonly the dotted IP address is used by the phisher to obfuscate the URL. Like instead of our misspelled domain name realbankS.com we have use the IP address 173.193.212.4. There are the other formats also available for the IP address such as dot less IP address in decimal, dotted IP address in octal, dotted IP address in hexadecimal, dot less IP address in hexadecimal [7]. D. Friendly Login URL: Many web browsers allows for the URLs that contain authentication information such as username and password. The general format is url://username:password@hostname/path. So, by using this facility the attackers may proxy the username and password field for targeted organization. For example: following URL sets the username = onlinebanking and password = realbank.com and the destination hostname is realbankS.com. So, the URL looks like http://onlinebanking:realbank.com@realbankS.com/ fakepage.php. Through the above URL, user thinks that they are visiting the legitimate onlinebanking of realbank.com site. But truly they are visiting the fake page of realbankS.com. That fake page will resemble to realbank.com [8]. E. Encoded URL Obfuscation: In this method, phisher obfuscate the URL using encoding schemes. It is trivial for the phisher to obfuscate the true nature of URL using the encoded schemes. 340 | P a g e
  • 4. Jigar Rathod et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342 V. ANTI-PHISHING TECHNIQUE FOR URL OBFUSCATION Anti-phishing refers to the method employed in order to detect and prevent phishing attacks. To protect the users against phishing attacks, various anti-phishing techniques have been proposed that follows different strategies like client side and server side protection [3]. From the various anti-phishing techniques, URL Obfuscation anti-phishing technique used to keep the user‘s data safe. To protect the user from obfuscated URL various tools are available which works on client side. And the existing algorithm used to prevent this attack which works on server side. As the different characteristics used in URL Obfuscation phishing attacks any single tool are not capable to check all the characteristics of URLs. The tools like EarthLink toolbar, Netcraft anti-phishing toolbar, SpoofGuard toolbar produce very high false positive results. They all are relying only on blacklist and whitelist; it cannot identify the URL if it is used IP address, Shortened URL or encoded URL [9]. The LinkGuard algorithm works on server side and it is then only one existing algorithm to check the maximum characteristics of URL. LinkGuard can detect known as well as unknown URL Obfuscation phishing attacks. None of the tools are perfect then LinkGuard algorithm at the current stage of URL Obfuscation phishing attack [10].  LinkGuard is based on careful analysis of the characteristics of phishing hyperlink or URL.  Link has verified very low false negative rate for the unknown phishing attacks. Basically, LinkGuard algorithm works on the hyperlinks. So, when the hyperlink will be found in e-mail, the algorithm performs the following steps: A. Visual DNS and Actual DNS: LinkGuard first extract the DNS name from actual and visual link. And then compare both the name. If both the names are different then it warns the user as phishing URL [10]. For example: if the hyperlink found in e-mail, then if the actual DNS is http://www.paypal.com and the visual DNS also same as actual DNS. Then, the DNS test will declare the results as Both the DNS are same. B. Dotted decimal IP address: If dotted decimal IP address is directly used in actual DNS, then it warns the user as phishing URL. So, this test produces the false positive result. Because, if any legitimate site uses their IP address, www.ijera.com www.ijera.com LinkGuard algorithm will declare the results as phishing URL [10]. For example: if the hyperlink found in e-mail, then if the actual DNS is http://120.120.55.101/ and the visual DNS is paypal, then it declares that hyperlink or URL as phishing URL [10]. C. Encoded URL: If the actual link or visual link is encoded, the linkguard algorithm first decodes the URL and displays the actual URL then recursively call linkguard to return the result. For example: if the hyperlink found in e-mail, the actual DNS is http%3A%2F%2Fpaypal-cgi.com and the visual DNS is paypal. Then the URL encoded test will decode the URL as http://paypal-cgi.com and results as URL is encoded, phishing may be possible. D. Analyse Domain Name : When there is no destination information (DNS name or dotted decimal IP address) is found in visual link, linkguard call the analyse DNS to analyse the actual DNS [10]. E. Black List & White List: Linkguard algorithm will check the URL in blacklist and white list. If DNS name is contained in blacklist, then we are sure that it is a phishing URL, and results as blacklisted URL. And if DNS name contained in whitelist we are sure that it is not phishing URL, and results as white listed URL, no phishing [10]. If DNS name is not identical in either blacklist or whitelist, the pattern matching test will be performing. F. Pattern Matching: Pattern matching designed to handle unknown phishing attacks. In this case the blacklist and whitelist is useless. If two DNS name are similar but not identical, then it is possible phishing attack. For instance pattern matching can easily detect the difference between both the DNS [10]. It checks the maximum likelihood of both the DNS name. The similarity index between two strings is determined by calculating the minimal number of changes in strings. For example: similarity index of ‗microsoft‘ and ‗micr0s0ft‘ is 7/9. Similarly, the similarity index of ‗paypal‘ and ‗paypal-cgi‘ is 6/10. Pattern matching can easily detect the difference between www.icbc.com.cn and www.1cbc.com.cn. VI. CONCLUSION URL Obfuscation is a critical issue now a day. Several methods used in this attacks and several mechanism works against this attacks but 341 | P a g e
  • 5. Jigar Rathod et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.338-342 still there are some challenges which needs to be considered. So, there is likelihood to overcome these drawbacks and try to make a solid algorithm that may cover maximum URL Obfuscation phishing attacks. www.ijera.com Journal for Scientific Research (IOSR), eISSN: 2278-0661, p-ISSN: 2278-8727, Volume.14 Issue.3, Pages: 28-36. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Anti-phishing Working Group (APWG) Official site, http://www.apwg.org Gaurav, Madhuresh Mishra, Anurag Jain, (March-April 2012) ―Anti-phishing techniques: A Review‖ International Journal of Engineering Research and Application (IJERA), ISSN: 2248-9622, Volume.2 Issue.2, Pages: 350-355. Madhuri S. Arade, P.C.Bhaskar (June 2011) ―Anti-phishing Model with URL & image based webpage Matching‖ International Journal of Computer Science and Technology (IJCST) ISSN: 2229-4333 (Print), 0976-8491 (Online), Volume 2, Issue.2, Pages: 282-286. Gunter Ollmann, Director of Security Strategy, IBM Internet Security System. ―The Phishing Guide: Understanding & Preventing Phishing Attacks‖. Anti-Phishing Working Group (APWG) – Phishing Activity Trends Reports 2013. (July 2013). http://docs.apwg.org/reports/apwg_trends_r eport_q1_2013.pdf. Soojin Yoon, Jeongeun Park, Changkuk Choi, Seungjoo Kim (July 2013) ―SHRT: new method of URL shortening including relative word of target URL‖ Symposium on usable privacy and Security (SOUPS) July 24-26, 2013, Newcastle, UK. P.Malathi, Dr.P.Vivekanandan (November2012) ―An efficient framework for internet banking‖ International Journal of Engineering Science and Research Technology (IJESRT), ISSN: 2277-9655, Pages: 545-551. Dr.Marthie Grobler (August 2010) ―Phishing for Fortune‖ Information Security for South Africa Conference, Sandton, South Africa. 2-4 August 2010, Pages: 8-15. Lorrie Cranor, Serge Egelman, Jason Hong, and Yue Zhang (November 2006) ―Phinding Phish: Evaluating Anti-phishing Tools‖, CyLab Carnegie Mellon University. U.Naresh, U.Vidya Sagar, C.V.Madhusudan Reddy (Sep-Oct 2013) ―Intelligent Phishing Website Detection and Prevention System by Using LInkGuard Algorithm‖ International www.ijera.com 342 | P a g e