phigaro automatic phishing detection and incident
play

PhiGARo: Automatic Phishing Detection and Incident Response - PowerPoint PPT Presentation

PhiGARo: Automatic Phishing Detection and Incident Response Framework Martin Husk, Jakub egan {husakm|cegan}@ics.muni.cz ECTCM 2014 Fribourg, Switzerland Outline Introduction, Phishing incident response, PhiGARo (phishing


  1. PhiGARo: Automatic Phishing Detection and Incident Response Framework Martin Husák, Jakub Čegan {husakm|cegan}@ics.muni.cz ECTCM 2014 Fribourg, Switzerland

  2. Outline — Introduction, — Phishing incident response, — PhiGARo (phishing incident response tool), — Phishing honeypots (work in progress), — Conclusion. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 2 / 23

  3. Research Questions Question I. How can we effectively handle a phishing incident? Question II. Can we automate phishing incident handling? Question III. Can we automate phishing incident reporting? Question IV. How can we attract phishers to phishing sensors? Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 3 / 23

  4. Masaryk University — 40,000 users, — 15,000 active IP addresses a day, — Many faculties, subnets, and local administrators, — 1 security department – CSIRT-MU. — Not applying strict firewall or e-mail filtering rules, — Emphasis on open network and academic freedom. — >100 reported phishing incidents per year, — Unknown number of unreported incidents. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 4 / 23

  5. Tools of the Trade — Central security contact point, — Interaction with end-users and local administrators, — Request tracking software (RT), — 24 network probes (NetFlow, IPFIX), — Custom NetFlow analysis tools as an output of R&D. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 5 / 23

  6. Phishing incident response Question I. How can we effectively handle a phishing incident? Question II. Can we automate phishing incident handling? Question III. Can we automate phishing incident reporting? Question IV. How can we attract phishers to phishing sensors? Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 6 / 23

  7. Phishing incident response 1. Incident is reported, 2. Searching for victims – checking mailserver logs and network monitoring data, 3. Interpreting the result, filtering false positives, 4. Mitigation – restricting access to phishing websites, filtering e-mails, 5. Send warning to victims, 6. Receive confirmation from victims. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 7 / 23

  8. Phishing incident response — We rely on reports from users, — Manual handling requires experienced worker, — The process is laborious and time consuming, — It may be too late to mitigate the attack. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 8 / 23

  9. Phishing incident response Question I. How can we effectively handle a phishing incident? Question II. Can we automate phishing incident handling? Question III. Can we automate phishing incident reporting? Question IV. How can we attract phishers to phishing sensors? Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 9 / 23

  10. PhiGARo — Phishing: Gather, Analyze, React, and Distribute, — Semi-automatic phishing incident response tool, — Modular architecture, — Incident handler runs PhiGARo after receiving phishing report, — PhiGARo performs the incident handling routine, — Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 10 / 23

  11. PhiGARo Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 11 / 23

  12. PhiGARo Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 12 / 23

  13. PhiGARo modules — Request Tracker integration, — URL expander and URL redirection uncloaking, — Sendmail log parsing module, — NetFlow/IPFIX module (network traffic monitoring), — HTTP(S) module (extended flow monitoring), — E-mail blocking API, — RTBH API (blocking of network traffic), — Reporting phishing hosted on Google Docs, — Storage of phishing pages (screenshots), — Phishing form filling simulator. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 13 / 23

  14. Phishing detection Question I. How can we effectively handle a phishing incident? Question II. Can we automate phishing incident handling? Question III. Can we automate phishing incident reporting? Question IV. How can we attract phishers to phishing sensors? Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 14 / 23

  15. Phishing detection — Reliance on user reports is insufficient, — Existing methods focus on filtering e-mail on mailservers or mailboxes, — Keyword search, data mining, machine learning... — Maintaining common phishing reporting tool in large networks is difficult. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 15 / 23

  16. Honeypots — System resources whose value lies in illicit use, — Honeypots are generally free of false positives, — Spamtrap – honeypot e-mail address or mailserver deployed to collect spam, — Honeytoken – e-mail address, account name... Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 16 / 23

  17. Honeypots — Mailserver honeypot is deployed in the network, — Phishing detection method is set up at the honeypot, — Incoming e-mails are checked if they contain phishing, — Recognized phishing is reported to PhiGARo, — PhiGARo automatically starts handling the incident. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 17 / 23

  18. Phishing detection Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 18 / 23

  19. Attracting attackers Question I. How can we effectively handle a phishing incident? Question II. Can we automate phishing incident handling? Question III. Can we automate phishing incident reporting? Question IV. How can we attract phishers to phishing sensors? Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 19 / 23

  20. Attracting attackers — Honeytokens are placed to be accessible by web crawlers, e-mail harvester... — Responding to earlier phishing from honeytoken e-mail addresses, — Using PhiGARo to respond automatically (extension of form filling simulator), — Black market poisoning (advanced). Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 20 / 23

  21. Attracting attackers — Concept of Virtual organization , — Custom domain, honeytokens, web content, etc. assigned to honeypots, — Increasing trustworthiness of a honeypots and honeytokens, — Adversary checks the domain, visits website, and is persuaded that the honeytokens are valid. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 21 / 23

  22. Conclusion — Manual phishing incident handling is laborious. — The process of incident handling is automated by the phishing incident response tool PhiGARo. — PhiGARo is publicly available as a modular tool at: http://www.muni.cz/ics/services/csirt/ tools/phigaro?lang=en — We propose using honeypots to overcome reliance on user reports. — A concept of Virtual organization was discussed to attract phishers to honeypots. Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 22 / 23

  23. Thank you for your attention. Martin Husák, Jakub Čegan {husakm|cegan}@ics.muni.cz

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend