improving domain names utilization
play

Improving Domain Names Utilization Ning Kong June 27, 2017 Content - PowerPoint PPT Presentation

Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q & A Status Quo of Chinese Phishing


  1. Improving Domain Names Utilization Ning Kong June 27, 2017

  2. Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q & A

  3. Status Quo of Chinese Phishing Websites 1600 16 0000 00 14721 211 1400 14 0000 00 1200 12 0000 00 1000 10 0000 00 80 8000 000 70483 83 61017 17 60 6000 000 58660 60 35176 76 40 4000 000 20 2000 000 0 2012 2012 2013 2013 2014 2014 2015 2015 2016 2016 In 2016, The total amount of Chinese phishing websites is 147,211, which is 2.5 times bigger than that of 2015. Phishing attacks become more rampant and governance situation become more severe.

  4. Status Quo of Chinese Phishing Websites Others 0.79% E-commerce 5.21% Telecommunication 20.55% Payment Transaction 45.70% Financial Secutity 27.76% Distribution of Industries

  5. Status Quo of Chinese Phishing Websites .br 0.80% .cl .au .top 0.67% 0.85% 0.95% .tk 1.03% others .cn 6.04% 1.39% .pw .net 6.09% 2.98% .cc .com 14.95% 64.24% Distribution of TLDs

  6. Status Quo of Chinese Phishing Websites 10 days 1.17% 11 days 9 days 1.17% 1.15% 12 days or more 1 day 8 days 16.87% 15.25% 1.71% 2 days 7 days 19.83% 2.86% 5 days 6 days 6.62% 3.89% 4 days 11.71% 3 days 17.77% Distribution of Phishing Websites Life Duration

  7. Anti-Phishing Alliance of China (APAC)  Founded on July 18, 2008  A nonprofit industry organization  CNNIC assumes the duties of secretariat  Official Website : www.apac.cn  Reporting Email : jubao@apac.cn

  8. APAC Members APAC is mainly comprised of registries and registrars, financial agencies, e-commerce enterprises and cybersecurity companies. Up to the end of 2016, the number of APAC members increased to 523.

  9. APAC Duties Organize members in finding out, governing and preventing from phishing sites, share relevant information and promote construction Perform international exchange and of comprehensive governance system cooperation concerning legislation research, technical application and standard formulation Organize and carry out investigation and research on anti-phishing, provide relevant business and policy consultation services for members as well as offer decision support for government

  10. APAC Architecture APAC Third-Party Technical Expert Steering Secretariat Members Recognition Institutions Committee Responsible for preservation and Members’ Conference has the Responsible for daily work of technical recognition for APAC, preparation of Members’ Responsible for carrying out right to formulate and modify the phishing webpages; and propose guidance on operation of APAC Conference and treatment of Articles and make decisions on advices on technical recognition unexpected events important matters for phishing websites

  11. APAC Treatment Categories APAC registries/registrars If the website is totally fake will suspend the resolution service For Domain Names registered in China APAC registries/registrars If the website is partly fake will inform registrant to delete the phishing webpages APAC cybersecurity companies and browser makers will “tweet” warnings through theirs products For Domain Names registered outside China when users visit phishing websites

  12. APAC Treatment Efficiency 107303 66296 58660 51198 40219 26672 23722 1610 10316 2008 2009 2010 2011 2012 2013 2014 2015 2016 In 2016, the APAC has identified and processed a total of 107,303 phishing websites, accumulatively up to 385,996.

  13. CNNIC’s Contributions ---Proactive Phishing Detection System Since 2009, CNNIC has been focusing on the anti-phishing technical research, the “ Proactive Phishing Detection System ” is an important achievement. The core of the system is based on the Big Data analysis for the machine learning of domain name utilization. The phishing websites can be monitored and tracked from the registration phase, and can be discovered and disposed when they online.

  14. CNNIC’s Contributions ---Proactive Phishing Detection System Title Domain Name Resolution

  15. CNNIC’s Contributions ---Proactive Phishing Detection System Detection Capacity  In 2016, the system identified and processed more than 40,000 phishing websites of 80 brands  The life duration of phishing website detected by the system is 4.684 days, much shorter than the average number Technical Achievements  CNNIC has published more than 10 academic papers and holds more than 10 anti-phishing patents  “Technical Specifications of Data Exchange for Reporting Phishing Attacks”, the only anti -phishing industrial standard in China

  16. CNNIC’s Contribution ---Reports & Briefings The “Global Chinese Phishing APAC releases Briefing every Attack Trends Report” analyzes the month, analyzing the situation phishing attacks targeting Chinese of phishing website treatment brands and users over the world

  17. Suggestions for Improving Domain Names Utilization  Strengthen universal  education for end users, Promote standardization  Encourage registries, and heighten their on identification, sharing registrars, academic awareness of online risks and disposal, and seek institutions to facilitate more cooperative chances scientific research, with government agencies data exchanging and technology sharing Strengthen Education Enhance Supervision Capacity Building Technic Disposal Awareness

  18. THANKS! Q & A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend