Difference between revisions of "The Consequence of Non-Cooperation in the Fight Against Phishing"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 16: Line 16:
 
==Key Words==  
 
==Key Words==  
  
Association For Computing Machinery, ACM, phishing, Internet, websites, cybercrime, economics, financial services, bank, security
+
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Credit_Card_Fraud Credit Card Fraud],
 +
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy Disclosure Policy],
 +
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Outreach_and_Collaboration Outreach and Collaboration],  
 +
[http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas#Phishing Phishing],
  
 
==Synopsis==
 
==Synopsis==

Revision as of 18:15, 24 June 2010

Full Title of Reference

The Consequence of Non-Cooperation in the Fight Against Phishing

Full Citation

Tyler Moore and Richard Clayton, The Consequence of Non-Cooperation in the Fight Against Phishing, 3rd Annual APWG eCrime Researcher's Summit, Association for Computing Machinery, October, 2008. Web AltWeb

BibTeX

Categorization

Key Words

Credit Card Fraud, Disclosure Policy, Outreach and Collaboration, Phishing,

Synopsis

BA key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others, but the company with the take-down contract remains unaware of them, or only belatedly learns that they exist. We monitored all of the Websites to determine when they were removed and calculate the resultant increase in lifetimes from the take-down company not knowing that they should act. The results categorically demonstrate that significant amounts of money are being put at risk by the failure to share proprietary feeds of URLs. We analyse the incentives that prevent data sharing by take-down companies, contrasting this with the anti-virus industry - where sharing prevails - and with schemes for purchasing vulnerability information, where information about attacks is kept proprietary. We conclude by recommending that the defenders of phishing attacks start cooperatively sharing all of their data about phishing URLs with each other.


Additional Notes and Highlights

Presentation Slides