Open Access Open Access  Restricted Access Subscription or Fee Access

Phising Attacks Prevention Using Web Cache Optimization

Dr.S.N. Sivanandham, Dr.M. Rajaram, S. LathaShanmugavadivu

Abstract


Phishing is an emerging type of social engineering crime on the Web. Most phishers initiate attacks by sending emails to potential victims. These emails lure users to access fake websites, and induce them to expose sensitive and/or private information. The rapid development and evolution of phishing techniques pose a big challenge in Web identity security for computer science researchers in both academia and industry. All phishing attacks spoof users from the visual level and semantic level, i.e., they make the appearances of web pages look similar to the real ones and make the web links and web page contents semantically related to the real ones. In this work, we evaluate visual features that are completely from the computer screen. After the fake page is got through web cache, we check each cache file in the cache directory through phishing. Caching is a technique first used by memory management to reduce bus traffic and latency of data access. With the significant increase of Web traffic, caching techniques are applied to Web caching to reduce network traffic, user-perceived latency, and server load by caching the documents in local proxies. In this work, analization of both advantages and disadvantages of some current Web cache replacement algorithms including lowest relative value algorithm, least weighted usage algorithm and least unified-value (LUV) algorithm is done. Based on our analysis, we proposed a new algorithm, called least grade replacement (LGR), which takes recency, frequency, perfect-history, and document size into account for Web cache optimization..We use web caching techniques to assess the visual features’ similarity. We further convert the retrieved web pages into images and use EMD to calculate their similarity to the protected web pages. Our experiments show that this method is superior to all other visual assessment methods.

Keywords


Phising, Web Caching, Least Grade Replacement Algorithm, Prefetching, Parsing, EMD.

Full Text:

PDF

References


Pei Cao, Snady Irani, “Cost-Aware WWW Proxy Caching Algorithms”, in Proceedings of the USENIX Symposium on Internet Technologies and Systems, December, 1997.

K. Thompson, G. Miller, and R. Wilder, “Wilde-Area Internet Traffic Patterns and Characteristics,”in Proceedings of 3rd International Conference Web caching, May, 1998.

Seda Cakiroglu, Erdal Arikan, “Replace Problem in Web Caching”, in Proceedings of IEEE Symposium on Computers and Communications, June, 2003.

Chrlos Maltzahn, Kathy J. Richardson, Dirk Grunwald, “Reducing the Disk I/O of Web Proxy Server Caches”, in Proceeding of the 199 USENIX Annual Technical Conference, Monterey, California, June, 1999.

Luigi Rizzo and Lorenzo Vicisano, “Replacement Policies for a Proxy Cache”. IEEE/ACM Trans. Networking. Apr. 2000.

H. Bahn, S. Noh, S. L. Min, and K. Koh, “Using Full Reference History for Efficient Document Replacement in Web Caches”, in Proceedings of the 2nd USENIX Symposium on Internet Technologies & Systems,October,1999 .

Chowdhury A., Frieder O., Grossman D., and McCabe M., Collection Statistics for Fast Duplicate Document Detection, ACM Transactions on Information Systems, Volume 20(2), pages 171–191, 2002.

Cohen S.Guibas L., The Earth Mover’s Distance under Transformation Sets, in Proceedings of the IEEE International Conference on Computer Vision, Volume 2, pages 1076-1083, 1999.

Dhamija R. Hash visualization in user authentication. In Proceedings of the Computer Human Interaction 2000 Conference, April 2000.

Dhamija R.Tygar J. D., and Hearst M. Why Phishing Works, to appear in Proceedings of CHI-2006: Conference on Human Factors in Computing Systems, April 2006.

Dhamija R., Tygar J. D., The Battle against Phishing: Dynamic Security Skins, Symposium on Usable Privacy and Security 2005, pages 77-99, 2005.

Anti-Phishing Group of City University of Hong Kong, http://antiphishing.cs.cityu.edu.hk

Anti-Phishing Working Group, http://www.antiphishing.org


Refbacks

  • There are currently no refbacks.