WO2006060967A2 - System and method for extending an antiphishing aggregator - Google Patents
System and method for extending an antiphishing aggregator Download PDFInfo
- Publication number
- WO2006060967A2 WO2006060967A2 PCT/CN2005/002154 CN2005002154W WO2006060967A2 WO 2006060967 A2 WO2006060967 A2 WO 2006060967A2 CN 2005002154 W CN2005002154 W CN 2005002154W WO 2006060967 A2 WO2006060967 A2 WO 2006060967A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- aggregator
- alpha
- plug
- message
- messages
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 120
- 238000013515 script Methods 0.000 claims description 14
- 238000004458 analytical method Methods 0.000 claims description 12
- 230000002155 anti-virotic effect Effects 0.000 claims description 4
- 241000700605 Viruses Species 0.000 description 15
- 238000004891 communication Methods 0.000 description 11
- 230000008901 benefit Effects 0.000 description 9
- 238000012360 testing method Methods 0.000 description 7
- 238000010200 validation analysis Methods 0.000 description 7
- 230000000903 blocking effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012015 optical character recognition Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 241000239290 Araneae Species 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000005304 joining Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000035755 proliferation Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 244000068988 Glycine max Species 0.000 description 1
- 235000010469 Glycine max Nutrition 0.000 description 1
- 241000209140 Triticum Species 0.000 description 1
- 235000021307 Triticum Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000009193 crawling Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 229910000078 germane Inorganic materials 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Definitions
- This invention relates generally to information delivery and management in a computer network. More particularly, the invention relates to techniques for automatically classifying electronic communications and web pages as phishing or non-phishing.
- Some phishers introduce by various means viruses that take over computers. These viruses can then issue phishing messages, without these messages coming directly from a computer owned by the phisher. Also, a virus might act as a web server, to be the destination of links in phishing messages. The virus would then forward received information to another computer controlled by the phisher. In both cases, the aim is for the phisher to conceal her presence.
- Such phishing networks are called “bot nets", where "bot” stands for "robot”.
- the viruses are often called “malware” [aka. "malicious software”]. In this aspect, phishing is merging into the general problem of malware.
- the message might urge this, saying that the patch fixes a security bug.
- Another example is where the sender pretends to be a computer gaming company.
- the patch will supposedly speed up the response time on your computer, in a multiplayer game, that is played across the Internet. Or, you might be asked to download something, but are told that it is not a program, so you do not have to explicitly install it. Instead, it might be data, supposedly.
- some bugs might exist that enable the installation of malware without the user having to explicitly install a downloaded entity.
- the entity to be downloaded might not be in the message itself. Instead, the message might have a link, say, to some location on the network, containing that entity. Many other variants are possible. Note that, as in these examples, the purported companies need not have anything to do with the financial sector.
- a general purpose search engine can be manipulated by fraudsters, who set up websites purporting to offer goods and services. Then, via widely known Search Engine Optimization methods, they can pump up their unpaid rankings, when a search engine returns answers to a query. These methods might involve the use of link farms. Or, the fraudsters might buy ad space on the engines, where the ads might be associated with particular key words. So that when a user queries with those words, the fraudsters' websites would be shown as clickable ads. In both cases, the intent is to persuade the user to go to a fraudster's website.
- the blacklist is updated regularly (possibly daily or hourly) from an Aggregator website that uses our Bulk Message Envelope and clustering methods on new groups of electronic messages to find clusters of pornographic websites. This method can also filter other types of electronic interactions, like SMS, IM and junk faxes. Plus, our website can also offer other types of domains for the browser to block. These might be hate websites or financial fraud websites. Using watermarking methods, the Aggregator can detect if competitors copy its blacklists. The plug-in can also upload anonymized reporting information that lets the Aggregator improve its analysis of undesired websites.
- VSE Validated Search Engine
- the VSE restricts its search to websites of the Aggregator's clients, which are typically well known, large companies. These clients can also sponsor or validate their business partners or franchisees, to build up the scope of the Aggregator' VSE.
- the VSE can also optionally pass search queries down to its clients' search engines, which confine themselves to the clients' websites and inventory.
- the Aggregator can act as a UDDI by only registering services from its clients. (It can also furnish such information to other UDDIs.)
- the Aggregator can be a Trusted UDDI, to help enable commercial Web Services.
- Fig. 1 shows the general configuration on a computer network of various elements in our Invention - the Aggregator, its client companies and a browser with a plug-in that gets information from the Aggregator.
- Fig. 1 shows the general configuration on a computer network of various elements in our Invention - the Aggregator, its client companies and a browser with a plug-in that gets information from the Aggregator.
- the first relates to attacking malware in electronic messages.
- the second relates to blocking pornographic websites and content.
- the third relates to making a validated search engine.
- the common theme is to expand the ability of a centralized Aggregator and a browser plug-in that gets and sends data to the Aggregator.
- the intent is that the end user, who uses a browser (or equivalent program) is less likely to encounter fraudulant or offensive messages or websites.
- Our methods can be used in a plug-in for a browser or any other program that is used to view messages on the recipient's machine. They can be used to validate any part or parts of the message that the plug-in can programmatically find. We use the concept of the ⁇ notphish> tag introduced in "2458".
- the plug-in might have a default policy that it will ask the Aggregator if authentic messages from Someco will have any attachments. Or, the notphish tag might have an attribute that says this. Hence, the Aggregator might have information given to it by Someco at some earlier time, that says "no". That is, currently, Someco will not issue any messages containing attachments. In this case, the plug-in knows that the message is not valid, without having to perform any analysis on the attachment. It can mark the message as invalid. Plus, if the user tries to download the attachment, the plug-in can issue a warning. Or, in some browsers, even disable the download.
- the plug-in can issue a list of hashes for valid attachments, to the Aggregator.
- the plug-in has slightly more work to do. It can compute a hash of the attachment, and then see if it is in Someco's hash list, given to it by the Aggregator. Or it could send that hash to the Aggregator, who then makes the comparison, instead of the plug-in having to download the hash list. In either case, if the computed hash is not in Someco's hash list, the plug-in marks the message as invalid.
- the plug-in needs to download the attachment to the browser. But this attachment can be held in memory, without being written to disk. Plus, program control does not have to be passed to the attachment. And if so, it can be done after and only if the hash has been found and verified as a valid hash for that company. This is an important advantage of our method. Because an attachment might be written in a formatting language that is, in some respects, a programming language in its own right. An example is Adobe Corp.'s PDF language for describing images.
- the plug-in may have received the information about Someco from the Aggregator at some earlier time, and cached it locally.
- Another advantage is with respect to traditional antivirus methods. These take a given set of bits, and apply many analytical methods to discern if it is a virus. Sometimes, these methods might compute signatures (analogous to hashes) from the data, and then compare those against a database of signatures of known viruses.
- the database is analogous to a blacklist of spammer or phisher domains.
- the plug-in could optionally forward it or the entire message, to the Aggregator or the company or a regulatory authority, for more intensive analysis, which could include the standard antivirus methods.
- the plug-in or the browser itself, might have a policy that it will only run a script if it has been hashed and verified against a list from a reputable company. If this policy exists, the user might be able to enable or disable it.
- tags can also check arbitrary sections of a message body. For example, Someco might put a tag called “ ⁇ dohash>" at the start of a portion of the body, and a tag “ ⁇ /dohash>” at the end of that portion, for a given message that it actually sends out. Then, if the plug-in sees such tags, it can find the hash of the delimited area and compare it against Someco's hash list, as given by the Aggregator. These could be several such regions in the body from which to find tags.
- the plug-in can also validate or invalidate a website that the user is viewing, but now also using the above methods. This is useful if Someco has another website, perhaps of a subsidiary, and it want to programmatically reassure the user that web pages, and parts thereof, of that website are valid.
- Tag delimiters can be used by the plug-in to find hashes of parts of a page and then compared to a list of valid hashes from the Aggregator. Plus, if material is offered for download, it could be downloaded to memory and hashed, and then the hash is checked against the list of valid hashes.
- WS-Security (or variations of it), can be used to authenticate a BPEL message. It is designed for heavyweight encryption.
- our methods here can be used to validate portions of the message, via hashing and comparing to hash lists from an Aggregator. This extends our Web Services method of "2640", which discussed validating links in a WS document.
- the Aggregator can also use blacklists found by having spiders crawl the web and analyzing websites for porn content. Possibly correlating this data with that in another Electronic Communication Modality, like messages, in order to aid classification of the websites.
- the Aggregator can also use blacklists found by querying search engines and crawling the domains of the results.
- the queries might be vernacular sexual terms, in various languages. It is well known that many commercial websites, of whatever ⁇
- the Aggregator can also use blacklists found from antivirus methods.
- the Aggregator can also use blacklists found from antiphishing methods. Which might include the methods of our Antiphishing Provisionals.
- the Aggregator can then disseminate this to a plug-in that runs in the browser on a network node.
- the plug-in is produced by the Aggregator and quite possibly freely given out to users to install on their browsers.
- This dissemination of the blacklist can be via an unencrypted communication (e.g. http instead of https). Which reduces the computational load on both the Aggregator and the browser. Plus, because the blacklist, or updates to it, are read-only, as far as the clients are concerned, then it is possible to have a distributed group of Aggregator mirror sites that publish the data. Thus, the Aggregator can scale globally.
- the browser While we use the browser as an example on the client side, in general, it could also be any program that can display a message in a markup language that has hyperlinks, and where the program can follow a hyperlink if the user selects it. In this event, there could be another version of our plug-in, that runs within a given such program.
- the plug-in When the plug-in is installed, it can register itself with the Aggregator in order to receive timely updates of a blacklist. During this installation, the Aggregator may require the client to pay a license fee. Typically, the person furnishing the fee controls various parameters of the plug-in, via a password. Specifically, this can include being the only person that can modify the blacklist. Suppose the person is a parent. Then she can prevent her children from adjusting the blacklist.
- the plug-in would obtain a full blacklist from the Aggregator. Then, on some regular basis, it might obtain updates to the blacklist and occasionally another full blacklist.
- a network address e.g. an URL
- the plug-in would take that address and reduce it to a base domain. For example, "http://www.trythisnow.co.uk” would produce “trythisnow.co.uk”.
- the plug-in would then compare the base domain against those in its blacklist. If there is no match, then the browser goes to that URL, as usual. But if the domain is in the blacklist, then the plug-in prevents the browser from doing so. Possibly, the plug-in might display some message to this effect in the browser or in a popup window.
- the plug-in gets this list of hashes as its blacklist.
- it gets a user chosen base domain, it hashes the domain and then compares the hash with the blacklist, as before. The point is that the user cannot distinguish the random hashes from the non-random hashes. Thus, if we detect any of our random hashes in a competitor's blacklist hash table, then it is a strong indication of unauthorized usage.
- the plug-in Given a user defined base domain, the plug-in would see if it is in the hash table for unhashed domains. If so, then it blocks the domain. Else it applies any such watermarking step as was described above, and hashes the base domain. Then it checks this against the hash table for hashed domains. If present, then it blocks the domain. Else it lets the browser go to the domain.
- hash tables whether the data is hashed domains or unhashed domains.
- Aggregator could also offer other types of blacklists found by this means, or possibly also by other means.
- One type would be for porn, as already discussed.
- the plug-in might merge all such blacklists into one group. Or, preferably, maintain these as different blacklists. So that if a user tried to access a phishing website, for example, the plug-in might indicate what type of website is being blocked.
- the plug-in can also optionally have other tests on a network address that the user wants to go to. These might include scanning the text of the address for "bad words". Or perhaps letting the person who registered the plug-in with the Aggregator be able to add certain addresses as forbidden. Or to provide a whitelist of addresses that should be accessible, even if they appear on a blacklist from the Aggregator.
- the plug-in prefferably record certain types of information and then periodically upload these to the Aggregator. This could aid in the further analysis and detection of undesired websites.
- the plug-in can record certain information like the forbidden domain, and the current URL (or its base domain) that the browser is accessing, if any. (The browser might not currently be at any URL.) Plus maybe the time when this was done.
- the plug-in could also record whether the forbidden address was in a link that the user picked or if the user typed it into the address bar. If the former, then the plug-in might also record any other links (or the base domains of these links) in the page.
- the plug-in could analyze the current page being shown by the browser, and apply the canonical steps of "0046" and "1174" to find the page's styles. These styles can be collectively and compactly held as one long word (64 bits). Or, if the page is recognized by the plug-in as belonging to a known set of message providers, with known boundaries for a currently displayed message (“2528”), then the styles might be found for that message, as opposed to the entire page. Io
- these cached results could be uploaded to the Aggregator.
- This uploading might be initiated by either party.
- the person who registered the plug-in has the ability to turn off such uploading.
- the Aggregator can get results, across a wide range of its clients. Such information can be very useful.
- badwords.com is in a blacklist.
- the Aggregator finds that for 30% of the time that access is desired for badwords.com, the current URL's base domain is someSearchEngine.com. While 50% of the time, the base domain is someMailProvider.com and for 10% of the time, the base domain is anotherMailProvider.com. And the remaining 10% of the time, there were various other domains. This suggests that badwords.com is advertising itself with spam sent to the two mail providers, and that many users are using someSearchEngine to find it.
- badwords.com is probably either a paid advertiser or it is high in the results for some search query. If the latter is true, badwords.com might be manipulating the search engine's methods, perhaps via the use of link farms. Typically, a search engine company wants to know this, because such activities degrade the efficacy of its results.
- badwords.com also appears to be sending spam to users at the two mail providers. This information may have value to the providers. Note that in general, those mail providers are different from any that are using our methods of our Antispam Provisionals to analyze their messages, and from whom we derived the blacklist. So they might not be blocking badwords.com, whereas our mail providers already are, or will shortly be. Thus, we could offer such information to those other mail providers to suggest how they could improve their services to their customers.
- the Aggregator can surveil the distribution methods that a website is using. It may want to increase the percentage of times that badwords.com is accessed by typing into the address bar. Because this manual mode is not as convenient for the user, it might act to lower the absolute number of attempts to reach the website. Plus, suppose that for the 50% of the time that the users were at someMailProvider.com when trying to reach badwords.com, 80% of these instances had users typing it, instead of clicking on a link. This suggests that they are reading a message containing "badwords.com" in the text, or in an image in the message. Hence, we can add extra heuristics to detect such techniques. ⁇
- the plug-in also were to record the URL or its base domain, for where a user went, after she tried to reach a blocked URL, assuming that this new base domain was not also in a blacklist. If the blocked domain was a porn domain, then perhaps she is still intent on reaching similar domains. So the new unblocked domain might also be a porn domain. Hence, at the Aggregator, by analyzing such unblocked domains, we might get extra coverage of new, hitherto unknown porn domains.
- the Aggregator gets styles and domains uploaded, then it can construct style and domain clusters using the methods of "1745". Hence, our earlier methods that were applied to analyze clusters can also be used here.
- the Aggregator When the Aggregator gets such information from its clients, it may as a matter of policy or regulation apply various anonymizing steps to the information, to protect the privacy of its customers. For example, it can discard any specific items in the uploaded information that can uniquely identify the computer from which it came. As can be seen from the above example, much of its analysis is useful only in an aggregate sense anyway.
- a general purpose search engine can be manipulated by fraudsters, who set up websites purporting to offer goods and services. Then, via widely known Search Engine Optimization methods, they can pump up their unpaid rankings, when a search engine returns answers to a query. These methods might involve the use of link farms. Or, the fraudsters might buy ad space on the engines, where the ads might be associated with particular key words. So that when a user queries with those words, the fraudsters' websites would be shown as clickable ads. In both cases, the intent is to persuade the user to go to a fraudster's website. Here, the user is typically induced to entering her credit card information, or other personal data, in order to buy an item. Then, several things might happen:
- the fraudster might also make unauthorized purchases against her card. Worse, if the fraudster got enough personal information, she might j g
- search engines try to automate this as much as possible, to reduce their personnel costs. Basically, virtually any entity can buy ad space, so long as it pays the search engine, with this transaction often fully automated.
- Another partial answer is to join a website open to the public, where members institute feedback on each other regarding transactions.
- the best known examples are eBay, Amazon Marketplace and Yahoo Auctions. There are still problems here, with a certain level of fraudulent transactions.
- VSE Validated Search Engine
- each of the VSE's surveyed websites can maintain its own internal search engine.
- Our VSE is validated because we also integrate it with the methods of our Antiphishing Provisonals.
- an Aggregator we also include the possibility of a subAggregator.
- VSE The scope of the VSE can be enhanced in several ways.
- a company who is a client of the Aggregator so its pages validate (or at least do not invalidate).
- it has franchisees Typically, it has extensive knowledge of their corporate history.
- the company can, in effect, sponsor some of its financially stronger franchisees to be clients of the Aggregator, if they are not already so.
- Useful because a franchisee might be confined to one locality, and the Aggregator might have no a priori substantive knowledge of it.
- an optional but preferred method would be for the sponsoring company, or the affiliates that it sponsors, to post a bond or take out an insurance policy against such an eventuality.
- the VSE could also refer to a b2b portal or trade association, and its main corporate members. Where a similar mechanism of requiring a bond or insurance policy could be applied. It can be seen that such a bond or insurance ultimately benefits those who pay it, because it helps act as a barrier against fraudsters.
- the VSE might explicitly abjure ever having the broad scope of a general search engine. Which means that a user searching for an obscure or rare item might be less likely to find it in the VSE. But if, say, major retailers join the VSE, then the most commonly sold items could be found via the VSE, with strong antifraud confidence on the user's part.
- VSE and the associated companies can be reinforced with financial incentives given by credit card issuers to users who purchase online at the VSE's companies (as contrasted to online purchases elsewhere). Such a purchase might be made by the actual cardholder. Or she might have shopped at a fake website, whose phisher then used that information to make purchases at a VSE company. For a single purchase, the merchant may not be able to immediate distinguish between the two cases. But, over time, users should learn that shopping at a VSE company involves much less chance of fraud than at other websites. It is to a card issuer's benefit to reinforce this behavior, since the issuer also suffers fewer losses.
- the search results can also include advertising. Preferably clearly indicated as such; and distinct from the regular search results.
- the advertisers should be restricted to only those companies that have been validated by the Aggregator. Outside companies should not be allowed to advertise, as this allows an attack by phishers. ⁇
- the Aggregator can associate an email address for that plug-in. Over time, the Aggregator might build up a history for each registered user. Which could include a record of what types of items the user searches the VSE for. As well as the network address (IP address) or range of network addresses, of the user's computer, when the user contacts the VSE.
- IP address IP address
- range of network addresses of the user's computer
- VSE search by a registered user might have contextual information, external to the specific query.
- the VSE can also permit searches by users without plug-ins. But it could also ask these users to register with it.
- Advertisers might bid against each other for key words. So that when a user types in such a word or phrase, the ads that appear are from those advertisers bidding the highest for the word. As is well known, this is already being performed on general purpose search engines like Google and Yahoo.
- the advertisers that can bid are restricted to the Aggregator's validated clients. Where these have been subject to high scrutiny prior to being accepted as clients. In contrast to another search engine that might accept ads from virtually any organization or person that can pay it. Note that typically such a search engine makes no claims about validation or credentials of its advertisers.
- advertisers can also bid against each other for which type of user is making the query.
- An advertiser might consider that a registered user with a plug-in is of higher value to it than other types of users. Possibly because the user might be more confident and likely about entering into a real transaction, since she has our plug-in to detect scam websites and messages. So the Aggregator's user data can offer more value to advertisers, and thus extract another revenue source. ⁇
- Advertisers can also bid against each other for what domains or IP ranges or geographic or political regions that a user is from or not from. This location might be that where a user is currently at, when making the query to the VSE. Or, for registered users, it might be the domain (or the corresponding IP address of the domain) in the user's email address. Or the geographic or political region given in the user's information about herself, when she registered. For a registered user, where there might be a difference between a region in her information and the one where she is currently communicating from, the VSE might have some policy to distinguish between the two.
- the bidding mechanism can take into account factors other than just a simple comparison of monetary amounts. For example, an advertiser, Kappa, might the "favored" advertiser when the user comes from a *.ca domain. Prior to the auction, Kappa "bought" this right from the VSE. All this occurs on the VSE's computers, and in general the VSE has leeway to impose such conditions. So an implementation of this example might be that when Kappa bids, others must exceed her bid by some amount or percentage. This is just one example of how bids might be weighted in order to implement some policy. Clearly, there could be an arbitrarily complex mathematical implementation of a policy.
- Kappa might be the favored advertiser when there is a registered user with a plug-in, and who is also coming from a *.ca domain.
- Kappa bids 10 on a user coming from a .ca domain, and Omega bids 5 and Psi bids 4, then Kappa's probability of winning the bid is defined to be 10/(10+5+4) 10/19. That is, by the relative weighting of Kappa's bid, over all the bids. And if Kappa wins, then Kappa pays 10. With analogous statements for the others. Qualitatively, a mechanism like this lets advertisers with small budgets still have some chance of buying ads.
- VSE sends a query to one of its client's search engines. Where the returned results are not advertising.
- the VSE can offer extra value to its clients by also sending suitably anonymized data about the user, like the domain where the user is coming from, or the user's preferences.
- a registered user can opt out, by informing the VSE not to even pass such anonymized information about herself to a client search engine.
- B may feel a need to be defensive, given that the user got a message from B, or is at a website of B's.
- C and D are equally "vulnerable" when their websites or messages validate.
- the VSE might require that if B bids, then C or D need to bid at least some minimum amount or percentage above B's value, in order to win the ad. Whereas between C and D, if both meet this condition, then to decide between them as to who wins can just be a simple condition of who has the higher bid.
- B wins the ad it may not actually want to place an ad. Because the item that was validated is either a message from it, or one of its pages, so an ad might be redundant.
- WS Web Services
- API Application Programming Interface
- WSDL ⁇ Web Services Description Language
- BPEL Business Process Execution Language
- WS become popular, as their proponents hope. So that there may be millions of computers offering these, just as there currently are millions of websites.
- Alpha wants to find another WS satisfying certain criteria. To do so, it sends these criteria (or some subset) to a Universal Description, Discovery and Integration [UDDI] service that is usually on another computer.
- UDDI Universal Description, Discovery and Integration
- other WS that wish to be found register themselves with the UDDI.
- the UDDI sees if there is a match between Alpha's query and its database of registered services. If so, then it sends a list of these to Alpha, who then communicates directly with one or more of them.
- a UDDI might wish to somehow decide whether a WS that presents itself to registration should be accepted. Because a fraudster might be running one of those WS. Imposing a requirement that the WS carry a strong certification from some widely recognized certificate issuing authority may be insufficient. Those authorities might issue certificates after a payment and perhaps a cursory identity check. Typically, such a certificate in a message merely proves that a message can be traced back to a given party. It may not offer much validation about the background of that party.
- the Aggregator can act as a trusted UDDI. It only registers WS from its clients. There are two benefits to another WS using the Aggregator as a UDDI. Firstly, it gets WS that are highly unlikely to be fraudulent. Secondly, it can communicate with those WS using the lightweight validation described in our Antiphishing Provisionals, if it uses our plug-in. This latter point is optional, though preferred. Suppose it does not have our plug-in. So long as it can access our Aggregator UDDI and receive its replies unchanged, then it could use this context as an implicit validation of subsequent messages from those validated WS. There is still a risk of a man in the middle attacks on those later messages. So it should use our plug-in and possibly other measures.
- the WS Alpha asks another UDDI that is not the Aggregator.
- the UDDI might check with our Aggregator, in order to only allow registration from the Aggregator's clients. Hence, the Aggregator can obtain another revenue stream.
- This method is essentially a whitelist, akin to what has been used in the handling of email for many years. Where here, the whitelist is of known, good URLs, instead of email addresses.
- the method lacks our Partner Lists and notphish tags and their usages. The method suffers from the following disadvantages, compared to our method:
- a plug-in might cache Partner Lists for various companies, because these are short, so the bandwidth and storage requirements are minimal. Which helps reduce the overall demands on the server. But suppose there is a whitelist of URLs, and the plug-in caches the URLs that the user has visited, and which the server has said are in the whitelist. The very specific nature of a URL suggests that it is of limited use in a cache, with respect to the user going back to that URL. Essentially, the whitelist method means that the plug-in may have to keep going back to the server for whichever new URL the user is visiting.
- the whitelist is a list of known, good addresses. It says nothing about the contents of the pages at those addresses.
- a large company with many pages and many departments (sales, marketing, human relations, accounting etc). Often, different departments would maintain different parts of the website. And this would be done by different people.
- a phisher could try a network attack against some particular department or its computers. Such that she can modify an existing page, which is listed in the whitelist. By changing that to have a form where the user can submit personal information, and with a link to the phisher's external computer, she can try to redirect such information to herself.
- Rho whitelists its URLs. There is nothing to prevent another company, who is a client of Gamma, from setting up pages at its whitelisted URLs, that purport to be from Rho, or a marketing partner of Rho. Where this might be done with actual links to Rho, to add verisimilitude.
- Rho a company
- Rho whitelist
- Rho has a veto over the use of its name in other Partner Lists. 10.
- Less automated Based on publicly available information, current implementations of the whitelist use a manual scrutiny of some or all of the URLs received at Gamma from the companies. This adds to the cost of running Gamma, and it increases the delay, before which an URL can enter Gamma's database.
- Our method can use an automated verification of the Partner Lists that the Aggregator receives. Cheaper and faster. 11. Less advertising control. The previous item has a negative implication for a company that wants to start a surprise ad campaign, for example, using web pages that it builds, in isolation from the network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59311504P | 2004-12-12 | 2004-12-12 | |
US59311404P | 2004-12-12 | 2004-12-12 | |
US60/593,115 | 2004-12-12 | ||
US60/593,114 | 2004-12-12 | ||
US59318604P | 2004-12-18 | 2004-12-18 | |
US60/593,186 | 2004-12-18 | ||
US16492005A | 2005-12-11 | 2005-12-11 | |
US11/164,920 | 2005-12-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006060967A2 true WO2006060967A2 (en) | 2006-06-15 |
Family
ID=36578262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/002154 WO2006060967A2 (en) | 2004-12-12 | 2005-12-12 | System and method for extending an antiphishing aggregator |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006060967A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011500395A (en) * | 2007-10-31 | 2011-01-06 | センニア・ホーランド・ビー.ブイ. | Printhead mechanism and method of depositing material |
-
2005
- 2005-12-12 WO PCT/CN2005/002154 patent/WO2006060967A2/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011500395A (en) * | 2007-10-31 | 2011-01-06 | センニア・ホーランド・ビー.ブイ. | Printhead mechanism and method of depositing material |
US8557340B2 (en) | 2007-10-31 | 2013-10-15 | Xennia Holland B.V. | Print head arrangement and method of depositing a substance |
US9217224B2 (en) | 2007-10-31 | 2015-12-22 | Xennia Holland B.V. | Print head arrangement and method of depositing a substance |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stafford et al. | Spyware: The ghost in the machine | |
US7822620B2 (en) | Determining website reputations using automatic testing | |
US9384345B2 (en) | Providing alternative web content based on website reputation assessment | |
US8516377B2 (en) | Indicating Website reputations during Website manipulation of user information | |
US7765481B2 (en) | Indicating website reputations during an electronic commerce transaction | |
US8826155B2 (en) | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface | |
US8566726B2 (en) | Indicating website reputations based on website handling of personal information | |
Gandhi et al. | Badvertisements: Stealthy click-fraud with unwitting accessories | |
US20070094500A1 (en) | System and Method for Investigating Phishing Web Sites | |
US20090210937A1 (en) | Captcha advertising | |
US20060253584A1 (en) | Reputation of an entity associated with a content item | |
US20060253582A1 (en) | Indicating website reputations within search results | |
Jakobsson | The death of the Internet | |
Klein | Defending Against the Wily Surfer {-Web-Based} Attacks and Defenses | |
Harding et al. | Cookies and Web bugs: What they are and how they work together | |
WO2007016868A2 (en) | System and method for verifying links and electronic addresses in web pages and messages | |
WO2007076715A1 (en) | System and method of approving web pages and electronic messages | |
Huzairin et al. | Google’s Legal Responsibility in Displaying Phishing Ads Through Google AdWords | |
Zhu et al. | Ad fraud categorization and detection methods | |
Medlin et al. | The cost of electronic retailing: Prevalent security threats and their results | |
WO2006060967A2 (en) | System and method for extending an antiphishing aggregator | |
WO2006026921A2 (en) | System and method to detect phishing and verify electronic advertising | |
WO2006042480A2 (en) | System and method for investigating phishing web sites | |
Hoofnagle et al. | Online pharmacies and technology crime | |
Smith | Informational exchanges and dynamics of internet pornography in an e-commerce environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05818721 Country of ref document: EP Kind code of ref document: A2 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 5818721 Country of ref document: EP |