skip to main content
research-article

Itrustpage: a user-assisted anti-phishing tool

Published:01 April 2008Publication History
Skip Abstract Section

Abstract

Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability to deter phishing attacks, the research community needs to develop new approaches to anti-phishing solutions. Most of today's anti-phishing technologies focus on automatically detecting and preventing phishing attacks. While automation makes anti-phishing tools user-friendly, automation also makes them suffer from false positives, false negatives, and various practical hurdles. As a result, attackers often find simple ways to escape automatic detection.

This paper presents iTrustPage - an anti-phishing tool that does not rely completely on automation to detect phishing. Instead, iTrustPage relies on user input and external repositories of information to prevent users from filling out phishing Web forms. With iTrustPage, users help to decide whether or not a Web page is legitimate. Because iTrustPage is user-assisted, iTrustPage avoids the false positives and the false negatives associated with automatic phishing detection. We implemented iTrustPage as a downloadable extension to FireFox. After being featured on the Mozilla website for FireFox extensions, iTrustPage was downloaded by more than 5,000 users in a two week period. We present an analysis of our tool's effectiveness and ease of use based on our examination of usage logs collected from the 2,050 users who used iTrustPage for more than two weeks. Based on these logs, we find that iTrustPage disrupts users on fewer than 2% of the pages they visit, and the number of disruptions decreases over time.

References

  1. Anti-Phishing Working Group Website http://www.antiphishing.org/.Google ScholarGoogle Scholar
  2. Personal Communication, 2006. Confidential Source, Canadian Banking Sector. Toronto.Google ScholarGoogle Scholar
  3. iTrustPage Tool, 2007. http://www.cs.toronto.edu/~ronda/itrustpage/.Google ScholarGoogle Scholar
  4. M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can Machine Learning Be Secure? In Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS), Taipei, Taiwan, March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Chiasson and P. van Oorchot. A Usability Study and Critique of Two Password Managers. In Proceedings of the USENIX Security Symposium, August, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CNET News.com. New tool enables sophisticated phishing scams. http://news.com.com/New+tool+enables+sophisticated+phishing+scams/2100-1029_3-6149090.html.Google ScholarGoogle Scholar
  7. R. Dhamija, J. D. Tygar, and M. Hearst. Why Phishing Works. In Proceedings of Conference on Human Factors in Computing Systems (CHI), April 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In Proceedings of the Symposium on Usable Privacy and Security, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I. Fette, N. Sadeh, and A. Tomasic. Learning to Detect Phishing Emails. In Proceedings of the International World Wide Web Conference (WWW), Banff, Alberta, Canada, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. In Proceedings of the International World Wide Web Conference (WWW), Banff, Alberta, Canada, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Florêncio and C. Herley. Password Rescue: A New Approach to Phishing Prevention. In Proceedings of USENIX Workshop on Hot Topics in Security, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Franco. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers, 2005 http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx.Google ScholarGoogle Scholar
  13. GeoTrust. TrustWatch Search, 2006. http://www.trustwatch.com/.Google ScholarGoogle Scholar
  14. J. Halderman, B.Waters, and E. Felten. A convenient method for securely managing passwords. In Proceedings of the International Conference on World Wide Web, May, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Jackson, D. Boneh, and J. C. Mitchell. Stronger Password Authentication Using Virtual Machines. 2006. http://crypto.stanford.edu/SpyBlock/spyblock.pdf.Google ScholarGoogle Scholar
  16. K. Jackson. DNS Gets Anti-Phishing Hook, 2006. http://www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1.Google ScholarGoogle Scholar
  17. T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social Phishing. Communications of the ACM. Vol. 50, No. 10., October, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Liu, X. Deng, G. Huang, and A. Fu. An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, Vol. 10, No.2. 58--65, March/April, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Microsoft. Exchange Server, 2006. http://www.microsoft.com/exchange/default.mspx.Google ScholarGoogle Scholar
  20. Microsoft.com. Get anti-phishing and spam filters with Outlook SP2, 2005. http://www.microsoft.com/athome/security/email/outlook_sp2_filters.mspx.Google ScholarGoogle Scholar
  21. J. Nazario. Phishingcorpus: phishing2. http://monkey.org/~jose/phishing/phishing2.mbox.Google ScholarGoogle Scholar
  22. B. Parno, C. Kuo, and A. Perrig. Phoolproof Phishing Prevention. In Proceedings of Financial Cryptography and Data Security (FC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger Password Authentication Using Browser Extensions. In Proceedings of the Usenix Security Symposium, April, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Schneier. Two-Factor Authentication: Too Little, Too Late. Communications of the ACM. Vol. 48, No. 4., April, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. SURBL. Surbl lists, 2006. http://www.surbl.org/lists.html.Google ScholarGoogle Scholar
  26. Symantec. Symantec Internet Security Threat Report: Trends for July - December 06. http://eval.symantec.com/mktginfo/enterprise/white_papers/ent-whitepaper_internet_security_threat_report_xi_03_2007.en-us.pdf.Google ScholarGoogle Scholar
  27. M. Wu, R. Miller, and S. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks? In Proceedings of Conference on Human Factors in Computing Systems (CHI April 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Wu, R. Miller, and G. Little. Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. In Proceedings of the Symposium on Usable Privacy and Security, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. K. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In Proceedings of the Symposium on Usable Privacy and Security, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. Zhang, S. Egelman, L. Cranor, and J. Hong. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. In Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2007.Google ScholarGoogle Scholar
  31. Y. Zhang, J. Hong, and L. Cranor. CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. In Proceedings of the International World Wide Web Conference (WWW), Banff, Alberta, Canada, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Itrustpage: a user-assisted anti-phishing tool

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGOPS Operating Systems Review
      ACM SIGOPS Operating Systems Review  Volume 42, Issue 4
      EuroSys '08
      May 2008
      321 pages
      ISSN:0163-5980
      DOI:10.1145/1357010
      Issue’s Table of Contents
      • cover image ACM Conferences
        Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
        April 2008
        346 pages
        ISBN:9781605580135
        DOI:10.1145/1352592

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 April 2008

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader