期刊文献+

基于半脆弱水印的网络钓鱼主动防御技术 被引量:4

An Active Anti-Phishing Solution based on Semi-Fragile Watermark
下载PDF
导出
摘要 文章以复制著名站点的钓鱼网站为对象,基于半脆弱水印提出一种新的网络钓鱼主动防御技术,将融合域名、URL、Logo等网站身份特征的半脆弱水印,利用等价标记算法嵌入在网页中;检测时,比较可疑网站产生的水印与提取的水印,当两者不一致,可疑网站为钓鱼网站。文章首先分析主动防御的有效性,并验证融合网站特征的半脆弱水印性能。模拟网络钓鱼攻击实验表明,该方法能有效地检测出钓鱼者通过下载合法网站网页,进行少量修改后的钓鱼网站. A novel countermeasure scheme is proposed in this paper based on semi-fragile watermark, including of declaring website identity based on semi-fragile watermark, and detecting phishing webpage. The semi-fragile watermark with domain name, URL, Logo features of website is generated, and then embedded into the webpage to express the identity. When the suspicious webpage is met, the inconsistence of the generated semi-fragile watermark and the extracted information shows the phishing attack. The simulating phishing experiments show the method can effective detect the phishing attack by downloading the tactic’s webpage and modifying a little to lure the victims. So our phishing detection entails high cost to the adversary.
出处 《信息网络安全》 2013年第1期8-11,共4页 Netinfo Security
基金 国家自然科学基金[61202496] 湖南省自然科学基金资助项目[10JJ4043 10JJ5062] 湖南省科技计划重点项目[2010NK2003] 湖南省科技计划项目[2010TZ4012] 长沙市科技局科技计划项目[K1005180-61] 湖南省公安厅科学研究项目[湘公装[2008]14号]
关键词 网络钓鱼 网络钓鱼防御 网站特征 半脆弱水印 等价标记 phishing phishing countermeasure website characters semi-fragile watermark equal tag
  • 相关文献

参考文献12

  • 1HongJ. The State of Phishing Attacks[J].Communications of the ACM,2012,(01):74-81.
  • 2Topkara M,Kamra A,Atallah M J. ViWiD:Visible Watermarking Based Defense Against Phishing[A].Siena,Italy:Springer-Verlag Berlin Heidelberg,2005.470-483.
  • 3Steel C M S,Lu C. Impersonator identificaition through dynamic Fin?gerptinting[J].Digital Investigations,2008,(02):60-70.
  • 4Ma J,Saul L K,Savage S. Learning to Detect Malicious URIs[J].ACM Transactions on Intelligent Systems and Technology,2011,(03):1-30.
  • 5He M,Horng S,Fan P. An Efficient Phishing Webpage Detector[J].Expert Systems with Applications,2011,(10):12018-12027.
  • 6Xiang G,Hong J,Cranor L. CANTINA+ Feature-rich Machine Learning Framework for Detecting Phishing Web Sites[J].ACM Transactions on Information and System Security,2011,(02):21-48.
  • 7Zhang H,Liu G,Chow T W S. Textual and Visual ConteritBased Anti-Phishing:A Bayesian Approach[J].IEEE Transactions on Neural Networks,2011,(10):1532-1546.
  • 8Abbasi A,Zhang Z,Zimbra D. Detecting Fake Websites:The Contribution of Statisitical Learning Theory[J].MIS Quarterly,2010,(03):1-28.
  • 9Chen T,Dick S,Miller J. Detecting Visually Similar Web pages:Application to Phishing Detection[J].ACM Transactions on Internet Technology,2010,(02):1-38.
  • 10Kumaraguru P,Sheng S,Aquisti A. Teaching Johnny not to Fall for Phish[J].ACM Trsnsactions on Internet Technology,2010,(02):1-31.

二级参考文献13

  • 1沈勇.一种基于HTML文档的信息隐藏方案[J].武汉大学学报(理学版),2004,50(A01):217-220. 被引量:10
  • 2尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 3王兴元,石其江.基于图像特征和超混沌迭代的图像认证算法[J].计算机研究与发展,2005,42(11):1896-1902. 被引量:11
  • 4王让定,蒋刚毅,陈金儿,朱斌.基于陷阱策略的音频数字水印新方法[J].计算机研究与发展,2006,43(4):613-620. 被引量:9
  • 5X G Sui, H Luo. A new steganography method based on hypertext [C], In: Proc of Asia-Pacific Radio Science Conference. Piscataway, NJ: IEEE Press, 2004. 181-184.
  • 6C John. Hiding Binary Data in HTML Documents [OL], http://www. codeproject. com/csharp/steganodotnetl3. asp. 2005- 11-20.
  • 7HTML 4,0 Specifications [OL]. http://www.w3.org/TR/ 1998/REC- html40-19980424/. 2005-11-10.
  • 8F A P Petitcolas, R J Anderson, M G Kuhn. Information hiding-A survey [J]. Proceedings of the IEEE, 1999, 87(7) : 1062-1078.
  • 9F Johnson, S Jajodia. Steganography: Seeing the unseen [J]. IEEE Computer, 1998, 31(2): 26-34.
  • 10F Hartung, M Kutter. Multimedia watermarking techniques [J]. Proceedings of the IEEE, 1999, 87(7) : 1079-1107.

共引文献16

同被引文献29

  • 1全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 2顾流,万仲保,石红芹.基于web页信息隐藏的研究与实现[J].微计算机信息,2006,22(08X):186-187. 被引量:10
  • 3曹守斌.基于图像认证的脆弱水印技术研究[J].杭州:杭州电子科技大学,2011.
  • 4GaoT, Gu Q. Reversible image authentication based on combinationof reversible and LSB algorithm [C]Proceedings of 2007 InternationalConference on Computational Intelligence and Security Workshops.Harbin, China, 2007. 636-639.
  • 5G.Valenzise, M. Tagliasacchi, S. Tubaro,et al.A compressive-sensingbased watermarking scheme for sparse image tampering identification [C].IEEE, 2009: 1265-1268.
  • 6Cande s E J.Compressive sampling[J].Proceedings of the InternationalCongress of Mathematicians,Madrid,Spain,2006:1 —20.
  • 7A.Tiwari,M. Sharma. A Survey of Transform Domain basedSemifragile Watermarking Schemes for Image Authentication [J]. Joumalof The Institution of Engineers (India): Series B, 2013,93 (3):185-191.
  • 8AthiraV,Sudhish N George, Deepthi P P.A novel encryptionmethod based on compressive sensing[C]Automation, Computing,Communication, Control and Compressed Sensing (iMac4s), 2013International Multi—Conference on,IEEE,2013:271—275.
  • 9A.Abrardo, M. Barni. Fixed-Distortion Orthogonal Dirty PaperCoding for Perceptual Still Image Watermarking[C]In Information Hiding:6th International Workshop, IH 2004fToronto, Canada, May 23—25 2004,Revised Selected Papers.Springer, 2004.
  • 10M. Tagliasacchi, G. Valenzise, S. Tubaro. Localization of sparse imagetampering via random projections[C]In Proc.IEEE Int. Conf. ImageProcessing, San Diego, USA, 2008.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部