A Proactive Approach to Preventing Phishing Attacks Using a Pshark
File version
Version of Record (VoR)
Author(s)
Trevathan, Jarrod
Read, Wayne
Ghodosi, Hossein
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
Las Vegas, USA
License
Abstract
Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a Web site, potentially without knowledge of the Web site owner or host server. Initially the system is alerted to the presence of a phishing page upon receiving the Phisherpsilas solicitation e-mail. Next the system retrieves the location, IP address and contact information of the host server using a tracking program. Finally, the system sends notification to the Administrator about the phishing page on its server. It is then up to the host server Administrator to remove the phishing page from its server, or face the possibility of criminals continuing to use their site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers directly, rather than being a reactionary approach that is common to most email filters and anti-virus software.
Journal Title
Conference Title
2009 Sixth International Conference on Information Technology: New Generations
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Item Access Status
Note
Access the data
Related item(s)
Subject
Science & Technology
Computer Science, Artificial Intelligence
Computer Science, Information Systems
Computer Science, Software Engineering
Persistent link to this record
Citation
Shah, R; Trevathan, J; Read, W; Ghodosi, H, A Proactive Approach to Preventing Phishing Attacks Using a Pshark, 2009 Sixth International Conference on Information Technology: New Generations, 2009, pp. 915-921