220 likes | 245 Views
Anti-Phishing in CNNIC. Wang Wei Wangwei@cnnic.cn. Outline. 1. CNNIC and APAC. Outline. 2. CNNIC Anti-phishing Technology. 3. CNNIC Anti-phishing System. Overview. Anti-Phishing Alliance of China(APAC ) was founded on 2008-07-18.
E N D
Anti-Phishing in CNNIC Wang Wei Wangwei@cnnic.cn
Outline 1. CNNICand APAC Outline 2. CNNICAnti-phishing Technology 3. CNNIC Anti-phishing System
Overview Anti-Phishing Alliance of China(APAC ) was founded on 2008-07-18. APAC has 143 member units, including banking institutions, e-commerce sites, domain name registry, domain name registration, etc. The mission of APAC is to fight against phishing and spam attacks whose aims are identity theft and fraud crimes. In China, APAC is the only authority organization to solve the phishing problems. APAC has built a fast phishing domain names suspension process. The secretariat of APAC is located at CNNIC.
Phishing on Beijing Olympic Games • During 2007-2008, numerous phishing sites counterfeited official tickets sales, such as www.beijingticketing.com, www.beijing-tickets2008.com and www.beijingticketing.com. The scam is alleged to garner more than $50 million in this manner. • According to their Whois information, we retrieved all the related CN registration data, and found no related fhishing domain.
Phishing on donation sites • Both Wenchuan earthquake in 2008 and Yushu earthquake in 2010 become targets of phishing attacks. • Most of this attacks counterfeit official donation websites, for example, Red Cross sites. • http://cctv-t2.com/jk/index.htm • http://jk.ez.to • http://www.688tx.com/ • http://www.qq.com.indexq.cn/news/news.qq.com/a/20080512/index.htm
Domain Name Suspension Process The Alliance has established a procedure on reporting, confirming and taking down phishing sites. .CN domain Not .CN domain and registered in china Not .CN domain and registered out of china In the last 3 years, this procedure are very effective efficient in wiping out .CN phishing sites The technician in Alliance are also actively doing research in anti-phishing technologies, like using phishing heuristics and pattern recognize methodology, in order to make the procedure more efficient. System Detection Member Public Partner APWG, CERT, 123221, etc
The examples for browser blocking tips • MS IE • Firefox • Chrome • Opera • Maxthon
For more monthly reports, please visit http://www.apac.org.cn/gzdt/index.html 2010 2008-2009 2011.09 2011.11
E-commerce sites are main targets of phishing attack in China
Outline 1. CNNICand APAC Outline 2. CNNICAnti-phishing Technology 3. CNNIC Anti-phishing System
CNNIC Anti-phishing Technology(1) The feature of phishing sites English Domain taobao.com VS taoboo.com Levenshtein distance IDN 康师傅.中国 VS 康帅博.中国 pixel array distance • Over 84% of phishing URLs have simulate behaviors in their domains toward their target brands. • Domain similarity detection can be an entry to discover phishing sites. Domain Similarity Detection Technology
CNNIC Anti-phishing Technology(3) Phishing URL Construction Process In the past 12 months, the phishing detection system has found 4931 phishing URLs and 30.6% of them, which is 1509 phishing URLs are generated by combination method.
CNNIC Anti-phishing Technology(2) Discovering Phishing Sites in an Active Way Recursive DNS data analyzing combined with phishing reports knowledge DNS to find suspicious phishing URLs fast. Domain similarity detecting Digging DNS logs Statistics analysis of phishing reports Phishing URL constructing IPreverse lookup Determining Phishing Sites • Determining phishing sites using hybrid methods. • Webpage content analyzing • Domain registration information analyzing • The third part information analyzing (search engine, etc) • Other features
Outline 1. CNNICand APAC Outline 2. CNNICAnti-phishing Technology 3. CNNIC Anti-phishing System
Flow Chart of CNNIC Anti-phishing System DNS Query Logs Pre-process Phishing Hosts Retrieval Suspicious Phishing Host Phishing URL Construction Phishing Repository Phishing Path Frequency Compute Phishing Paths TOP N Domain Register Information PhishingURL Third Part Information Filtering URL Existence Detection APAC
Deployment & Running Auto-analyze phishing reports to refresh phishing paths’ frequency. Receiving and processing logs at 1:00 PM each day. Suspicious phishing hosts are auto-pushed Phishing web pages’ screenshot are auto-stored as evidences.
System Detection Result • Difference between social engineering and system detection • Local DNS log limitation • Need more data source
Thanks! 北京市海淀区中关村南四街四号中科院软件园 邮编: 100190 www.cnnic.cn