D 2014

PhiGARo: Automatic Phishing Detection and Incident Response Framework

HUSÁK, Martin and Jakub ČEGAN

Basic information

Original name

PhiGARo: Automatic Phishing Detection and Incident Response Framework

Authors

HUSÁK, Martin and Jakub ČEGAN

Edition

Fribourg, Switzerland, Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, p. 295-302, 8 pp. 2014

Publisher

IEEE

Other information

Language

English

Type of outcome

Proceedings paper

Field of Study

Informatics

Country of publisher

United States of America

Confidentiality degree

is not subject to a state or trade secret

Publication form

storage medium (CD, DVD, flash disk)

References:

Marked to be transferred to RIV

Yes

RIV identification code

RIV/00216224:14610/14:00076370

Organization

Ústav výpočetní techniky – Repository – Repository

ISBN

978-1-4799-4223-7

Keywords (in Czech)

phishing; PhiGARo; honeypot; CSIRT; IPFIX

Keywords in English

phishing; PhiGARo; honeypot; CSIRT; IPFIX
Changed: 1/9/2020 21:23, RNDr. Daniel Jakubík

Abstract

In the original language

We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing incidents automatically, it depends on reports of phishing incidents from users. We propose a framework which introduces honey pots into the process in order to eliminate the reliance on user input. The honey pots are used to capture e-mails, automatically detect messages containing phishing and immediately transfer them to PhiGARo. There is a need to propagate e-mail addresses of a honey pot to attract phishers. We discuss approaches to the honey pot e-mail propagation and propose a further enhancement to using honey pots in response to phishing incidents. We propose providing phishers with false credentials, accounts and documents that will grant them access to other honey pot services. Tracing these honey tokens may lead us to the originators of the phishing attacks and help investigations into phishing incidents.

Files attached