Learning to Detect Phishing Emails Ian Fette Norman

  • Slides: 28
Download presentation
Learning to Detect Phishing Emails Ø Ian Fette Ø Norman Sadeh Ø Anthony Tomasic

Learning to Detect Phishing Emails Ø Ian Fette Ø Norman Sadeh Ø Anthony Tomasic Ø Presented by – Bhavin Madhani

Authors Ian Fette: - Masters degree from Carnegie Mellon University. - Product Manager at

Authors Ian Fette: - Masters degree from Carnegie Mellon University. - Product Manager at Google - works on the Google Chrome team. - Product manager for the anti-phishing and anti-malware teams at Google. Norman M. Sadeh: - Professor in the School of Computer Science at Carnegie Mellon University. - Director, Mobile Commerce Lab. - Director, e-Supply Chain Management Lab. - Co-Director, COS Ph. D Program. Anthony Tomasic: - Director of the Carnegie Mellon University. - Masters of science in Information Technology, Very Large Information Systems (MSIT-VLIS) Program. . Bhavin Madhani - UC Irvine - 2009

Introduction Ø Ø PHISHING ? Phishing through Emails Phishing Problem – Hard. An Machine

Introduction Ø Ø PHISHING ? Phishing through Emails Phishing Problem – Hard. An Machine Learning approach to tackle this online identity theft. Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //images. google. com - 2005

Popular Targets : March 2009 Top 10 Identified Targets Valid Phishes 1 Pay. Pal

Popular Targets : March 2009 Top 10 Identified Targets Valid Phishes 1 Pay. Pal 9, 605 2 e. Bay, Inc. 459 3 Bank of America Corporation 429 4 HSBC Group 265 5 Google 169 6 Alliance Bank 146 7 Facebook 104 8 Internal Revenue Service 96 9 JPMorgan Chase and Co. 73 HSBC 64 10 �Table courtesy: http: //www. phishtank. com/stats/2009/03/ Bhavin Madhani - UC Irvine - 2009

Background Ø Toolbars Ø Spoof. Guard Ø Net. Craft Ø Email Filtering Ø Spam.

Background Ø Toolbars Ø Spoof. Guard Ø Net. Craft Ø Email Filtering Ø Spam. Assassin Ø Spamato Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //images. google. com - www. glasbergen. com

Method Ø PILFER – A Machine Learning based approach to classification. Ø phishing emails

Method Ø PILFER – A Machine Learning based approach to classification. Ø phishing emails / ham (good) emails Ø Feature Set Ø Features as used in email classification Ø Features as used in webpage classification Bhavin Madhani - UC Irvine - 2009

Features as used in email classification Ø IP-based URLs: http: //192. 168. 0. 1/paypal.

Features as used in email classification Ø IP-based URLs: http: //192. 168. 0. 1/paypal. cgi? fix_account Ø Phishing attacks are hosted off of compromised PCs. Ø This feature is binary. Bhavin Madhani - UC Irvine - 2009

Ø Age of linked-to domain names: Ø ‘playpal. com’ or ‘paypal-update. com’ Ø These

Ø Age of linked-to domain names: Ø ‘playpal. com’ or ‘paypal-update. com’ Ø These domains often have a limited life Ø WHOIS query Ø date is within 60 days of the date the email was sent – “fresh” domain. This is a binary feature Bhavin Madhani - UC Irvine - 2009

Ø Nonmatching URLs Ø This is a case of a link that says paypal.

Ø Nonmatching URLs Ø This is a case of a link that says paypal. com but actually links to badsite. com. Ø Such a link looks like <a href="badsite. com"> paypal. com</a>. This is a binary feature. Bhavin Madhani - UC Irvine - 2009

Ø “Here” links to non-modal domain Ø “Click here to restore your account access”

Ø “Here” links to non-modal domain Ø “Click here to restore your account access” Ø Link with the text “link”, “click”, or “here” that links to a domain other than this “modal domain” Ø This is a binary feature. Image courtesy: http: //www. bbcchannelpartners. com/worldnews/programmes/1000001/ Bhavin Madhani - UC Irvine - 2009

Ø HTML emails Ø Emails are sent as either plain text, HTML, or a

Ø HTML emails Ø Emails are sent as either plain text, HTML, or a combination of the two - multipart/alternative format Ø To launch an attack without using HTML is difficult Ø This is a binary feature. Bhavin Madhani - UC Irvine - 2009 Image courtesy:

Ø Number of links Ø The number of links present in an email. Ø

Ø Number of links Ø The number of links present in an email. Ø This is a continuous feature. Ø Eg. Bankofamerica statement. Bhavin Madhani - UC Irvine - 2009

Ø Number of domains Ø Simply take the domain names previously extracted from all

Ø Number of domains Ø Simply take the domain names previously extracted from all of the links, and simply count the number of distinct domains. Ø Look at the “main” part of a domain Ø https: //www. cs. university. edu/ Ø http: //www. company. co. jp/ Ø This is a continuous feature. Bhavin Madhani - UC Irvine - 2009

Ø Number of dots Ø Subdomains like http: //www. my-bank. update. data. com. Ø

Ø Number of dots Ø Subdomains like http: //www. my-bank. update. data. com. Ø Redirection script, such as http: //www. google. com/url? q=http: //www. badsite. com Ø This feature is simply the maximum number of dots (`. ') contained in any of the links present in the email, and is a continuous feature. Image courtesy: Bhavin Madhani - UC Irvine - 2009 http: //www. roslynoxley 9. com. au/artists/49/Yayoi_Kusama/38/24460/

Ø Contains javascript Ø Attackers can use Java. Script to hide information from the

Ø Contains javascript Ø Attackers can use Java. Script to hide information from the user, and potentially launch sophisticated attacks. Ø An email is flagged with the “contains javascript” feature if the string “javascript” appears in the email, regardless of whether it is actually in a <script> or <a> tag Ø This is a binary feature. Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //webdevargentina. ning. com/

Ø Spam-filter output Ø This is a binary feature, using the trained version of

Ø Spam-filter output Ø This is a binary feature, using the trained version of Spam. Assassin with the default rule weights and threshold. Ø “Ham” or “Spam” Ø This is a Binary feature. Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //www. suremail. us/spam-filter. shtml

Features as used in webpage classification Ø Most of the features discussed earlier can

Features as used in webpage classification Ø Most of the features discussed earlier can also be applied towards classifiying a webpage in a browser environment. Ø Other Features include: Ø Site in browser history Ø Redirected site Ø tf-idf Bhavin Madhani - UC Irvine - 2009

Empirical Evaluation Ø Machine-Learning Implementation Ø Run a set of scripts to extract all

Empirical Evaluation Ø Machine-Learning Implementation Ø Run a set of scripts to extract all the features. Ø Train and test a classifier using 10 -fold cross validation. Ø Random forest as a classifier. Ø Random forests create a number of decision trees and each decision tree is made by randomly choosing an attribute to split on at each level, and then pruning the tree. Image Bhavin Madhani - UCcourtesy: Irvine -http: //meds. queensu. ca/postgraduate/policies/evaluation__promotion___appeals 2009

Ø Datasets Ø Two publicly available datasets used. Ø The ham corpora from the

Ø Datasets Ø Two publicly available datasets used. Ø The ham corpora from the Spam. Assassin project (both the 2002 and 2003 ham collections, easy and hard, for a total of approximately 6950 nonphishing non-spam emails) Ø The publicly available phishingcorpus (approximately 860 email messages). Bhavin Madhani - UC Irvine - 2009

Ø Testing Spam. Assassin Ø For comparison against PILFER, we classify the exact same

Ø Testing Spam. Assassin Ø For comparison against PILFER, we classify the exact same dataset using Spam. Assassin version 3. 1. 0, using the default thresholds and rules. Ø “untrained” Spam. Assassin Ø “trained” Spam. Assassin Bhavin Madhani - UC Irvine - 2009

Ø Additional Challenges Ø The age of the dataset Ø Phishing websites are short-lived,

Ø Additional Challenges Ø The age of the dataset Ø Phishing websites are short-lived, often lasting only on the order of 48 hours Ø Domains are no longer live at the time of our testing, resulting in missing information Ø The disappearance of domain names, combined with difficulty in parsing results from a large number of WHOIS servers Image courtesy: http: //illuminatepr. wordpress. com/2008/07/01/challenges/ Bhavin Madhani - UC Irvine - 2009

Ø False Positives vs. False Negatives Ø Misclassifying a phishing email may have a

Ø False Positives vs. False Negatives Ø Misclassifying a phishing email may have a different impact than misclassifying a good email. Ø False positive rate (fp) : The proportion of ham emails classified as phishing emails. Ø False negative rate (fn) : The proportion of phishing emails classified as ham. Bhavin Madhani - UC Irvine - 2009

Classifier False Positive Rate False Negative Rate PILFER, with S. A. feature 0. 0013

Classifier False Positive Rate False Negative Rate PILFER, with S. A. feature 0. 0013 0. 036 PILFER, without S. A. feature 0. 0022 0. 085 Spam. Assassin (Untrained) 0. 0014 0. 376 Spam. Assassin (Trained) 0. 0012 0. 130 Bhavin Madhani - UC Irvine - 2009

Feature Non-Phishing Matched Has IP link 0. 06% 45. 04% Has “fresh” link 0.

Feature Non-Phishing Matched Has IP link 0. 06% 45. 04% Has “fresh” link 0. 98% 12. 49% Has “nonmatching” URL 0. 14% 50. 64% Has non-modal here link 0. 82% 18. 20% Is HTML email 5. 55% 93. 47% Contains Java. Script 2. 30% 10. 15% Spam. Assassin Output 0. 12% 87. 05% Percentage of emails matching the binary features Bhavin Madhani - UC Irvine - 2009

Feature Number of links Number of domains Number of dots Mean phishing Std Mean

Feature Number of links Number of domains Number of dots Mean phishing Std Mean –Non Deviation – Deviation phishing Non phishing 3. 87 4. 97 2. 36 12. 00 1. 49 1. 42 0. 43 3. 32 3. 78 1. 94 0. 19 0. 87 Mean, standard deviation of the continuous features, per-class Bhavin Madhani - UC Irvine - 2009

Concluding Remarks Ø It is possible to detect phishing emails with high accuracy by

Concluding Remarks Ø It is possible to detect phishing emails with high accuracy by using a specialized filter, using features that are more directly applicable to phishing emails than those employed by general purpose spam filters. Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //images. google. com

Gone Phishing? Protect Yourself Stop · Think · Click THANK YOU Bhavin Madhani -

Gone Phishing? Protect Yourself Stop · Think · Click THANK YOU Bhavin Madhani - UC Irvine - 2009 Image courtesy: http: //images. google. com

Anti-Phishing Phil �http: //cups. cs. cmu. edu/antiphishing_phil/new/index. html Bhavin Madhani - UC Irvine -

Anti-Phishing Phil �http: //cups. cs. cmu. edu/antiphishing_phil/new/index. html Bhavin Madhani - UC Irvine - 2009 Image Courtesy: http: //cups. cmu. edu/antiphishing_phil/