• Title/Summary/Keyword: 피싱 공격

Search Result 101, Processing Time 0.026 seconds

Study on Anti-Phishing Solutions, Related Researches and Future Directions (피싱 대응 솔루션 연구 및 개발 현황 그리고 앞으로의 방향)

  • Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1037-1047
    • /
    • 2013
  • As damages from phishing have been increased, many anti-phishing solutions and related researches have been studied. Anti-phishing solutions are often built in web-browsers or provided as security toolbars. Other types of solutions are also developed such as email-filtering and solutions strengthening server authentication via secret image sharing. At the same time, researchers have tried to see the reasons why phishing works and how effective anti-phishing solutions are. In this paper, we review relevant anti-phishing solutions, their techniques and other phishing-related researches. Based on these, we summarize recommended ways to improve anti-phishing solutions and suggest the future directions to study to protect users from phishing attacks.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

테크리포트-신종온라인사기피싱대처법

  • Han, Lee
    • Digital Contents
    • /
    • no.11 s.150
    • /
    • pp.32-35
    • /
    • 2005
  • 최근 들어 온라인상에서는 신종 사기가 위력을 더해가고 있다. 조금만 허점을 보이면 사용자의 지갑을 털어 가 버리는‘ 피싱’이 바로 그것. 호환마마보다 더 무서운 피싱에 걸려들지 않기 위해선 각별한 주의가 요망되 지만, 무작정조심한다고해서피싱의공격을피해갈수있을까. 대답은물론‘ 아니오’다. 피싱에대한피해를 최소화하기 위해서는 갈수록 지능화돼 가는 공격 유형을 잘 파악하고 미리 대비하는 것이 최선책이다. 이에 최근늘어나는피싱공격유형및기술에대해서검토해보고이에따른대응방법을살펴본다.

  • PDF

A Profiling Case Study to Phishing Mail Attack Group (피싱 메일 공격조직에 대한 프로파일링 사례 연구)

  • Lee, Jae-il;Lee, Yong-joon;Kwon, Hyuk-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.91-97
    • /
    • 2020
  • Recently, phishing attacks targeting those involved in defense, security and unification have been on the rise. In particular, hacking attack organization Kimsuky has been engaged in activities to collect important information from public organizations through phishing attacks since 2013. In this paper, profiling analysis of phishing mail attack organization was performed. Through this process, we estimated the purpose of the attack group and suggested countermeasures.

Password-Based Mutual Authentication Protocol Against Phishing Attacks (피싱 공격에 대응하기 위한 패스워드 기반의 상호 인증 프로토콜)

  • Kim, Iksu;Choi, Jongmyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.41-48
    • /
    • 2018
  • Until now, various studies on anti-phishing have been conducted. The most typical anti-phishing method is a method of collecting URL information of a phishing site in advance and then detecting phishing by comparing the URL of the visited site with the previously stored information. However, this blacklist-based anti-phishing method can not detect new phishing sites. For this reason, various anti-phishing authentication protocols have been proposed. but these protocols require a public key and a private key. In this paper, we propose a password-based mutual authentication protocol that is safe for phishing attacks. In the proposed protocol, the mutual authentication between the client and the server is performed through the authentication message including the password information. The proposed protocol is safe to eavesdropping attack because the authentication message uses the hash value of the password, not the original password, And it is safe to replay attack because different messages are used every time of authentication. In addition, since mutual authentication is performed, it is safe for man-in-the-middle attack. Finally, the proposed protocol does not require a key issuance process for authentication.

Active Phishing Attack and its Countermeasures (액티브 피싱 공격 및 대응방안 고찰)

  • Kim, S.H.;Lee, S.H.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.3
    • /
    • pp.9-18
    • /
    • 2013
  • 인터넷을 기반으로 하는 서비스가 활성화됨에 따라, 불순한 목적으로 악용하는 사례 또한 증가하고 있다. 특히 피싱 공격은 사회적인 문제로까지 확대되고 있으며, 대응방안 또한 대국민 교육 차원에서 전달되고 있다. 하지만, 새롭게 등장하는 액티브 피싱 공격은 기존의 대응방안으로는 해결할 수 없으며, 여러 보안 기술을 사용하더라도 해결할 수 없다는 점에서 심각하다. 본고는 액티브 피싱에 대한 소개와 함께, 기존의 대응방안과 여러 보안 기술들의 한계점을 제시한다. 그리고 액티브 피싱을 해결하기 위해 필요한 기술의 요구사항을 고찰한다.

  • PDF

Survey on Phishing using Malicious Code in Internet Banking (인터넷 뱅킹에서 악성코드를 이용한 피싱에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.753-756
    • /
    • 2012
  • The type of phishing changes rapidly and also threat model changes very fastly Accordingly, frauds develop new methods of attacks to avoid the counterparts. Recently, the type of phishing in internet banking is developing specifically. In this paper, to help encounter for it, we first review the meaning of phishing and the types of attacks in phishing in the second chapter,and in the third chapter, we will analyze phishing which is using malicious code in internet banking,and in the fourth chapter, we will describe the conclusion of this paper.

  • PDF

A spear phishing threat and the prevention method for the end user (스피어 피싱 위협과 최종 사용자 관점에서 대응방안 제안)

  • Sohn, Yu-seung;Nam, Kil-hyun;Goh, Seung-chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.284-287
    • /
    • 2013
  • Recently target oriented attacks which target an enterprise and a government agency are increasing. The starting point of APT(Advanced Persistent Threat), called as target oriented attacks, is the spear phishing email that is personalized based on the information collected via Internet of the target personnel. It is known that 94% of target oriented attacks use spear phishing emails. Therefore, in this paper, we analysed spear phishing methods in detail and the characteristics and recent trends of spear phishing threats and proposed the effective prevention method of spear phishing for the end user.

  • PDF

An Anti-Phishing Approach based on Search Engine (검색 엔진 기반의 안티 피싱 기법)

  • Lee, Min-Soo;Lee, Hyeong-Gyu;Yoon, Hyun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.121-124
    • /
    • 2010
  • 피싱은 인터넷을 이용한 일종의 사기 수법이다. 피싱을 방지하기 위하여 웹 브라우저 밴더에서는 블랙리스트 기반의 피싱 탐지 기술을 제공하고 있다. 또한 기계학습을 이용한 피싱 탐지 기법들이 제안되어 피싱 공격에 대응을 하고 있다. 하지만, 피싱 공격이 진화 함에 따라 기존의 기술들이 탐지 못하는 경우가 발생을 한다. 피싱 페이지가 생성된 후 일정 시간이 지나지 않을 경우는 기존의 리스트 기반의 솔루션이 탐지를 하지 못하며, 이미지 기반의 피싱 공격의 경우 기존의 연구들이 탐지 하지 못한다. 이에 본 연구에서는 구글 검색엔진을 이용하여 이러한 문제점들을 해결하는 방안을 제안한다.

  • PDF

On the administrative security approaches against spear phishing attacks (스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근)

  • Sohn, Yu-Seung;Nam, Kil-Hyun;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2753-2762
    • /
    • 2013
  • Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(Advanced Persistent Threat) which targets an enterprise or a government agency to get the important data and disable the critical service starts with the spear phishing email. In this paper, we analysed the security threats and characteristics of the spear phishing in detail and explained why the technical solutions are not enough to prevent spear phishing attacks. Therefore, we proposed the administrative prevention methods for the spear phishing attack.