Loading...
Please wait, while we are loading the content...
Similar Documents
Phighting the phisher: using web bugs and honeytokens to investigate the source of phishing attacks.
| Content Provider | CiteSeerX |
|---|---|
| Author | Mcrae, Craig M. Vaughn, Rayford B. |
| Abstract | This paper presents a summary of research findings for a new reacitve phishing investigative technique using web bugs and honeytokens. Phishing has become a rampant problem in today’s society and has cost financial institutions millions of dollars per year. Today’s reactive techniques against phishing usually involve methods that simply minimize the damage rather than attempting to actually track down a phisher. Our research objective is to track down a phisher to the IP address of the phisher’s workstation rather than innocent machines used as intermediaries. By using web bugs and honeytokens on the fake web site forms the phisher presents, one can log accesses to the honeytokens by the phisher when the attacker views the results of the forms. Research results to date are presented in this paper. 1. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Research Result Rampant Problem New Reacitve Web Bug Using Web Bug Ip Address Phisher Workstation Investigative Technique Research Finding Reactive Technique Phisher Present Fake Web Site Financial Institution Million Innocent Machine Research Objective |
| Content Type | Text |
| Resource Type | Article |