You are on page 1of 9

A Game Theoretical Multi-layered Defense Approach Against Phishing Attacks

Oluwatoyin Gloria Ake-Johnson, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Collins Umana
Information Systems Security Department
Concordia University College of Alberta
7128 Ada Boulevard, Edmonton, AB T5B 4E4, Canada
Phone: 1.866.479.5200
{oakejohn, cumana}@csa.concordia.ab.ca, {pavol.zavarsky, ron.ruhl, dale.lindskog}@concordia.ab.ca

Abstract -The battle against phishers can be compared to a with hijacked brand names are genuine. Subsequently,
game, in that phishers have continuously adapted their attack phishers may plant malware on the victims‟ computer
techniques to sidestep countermeasures. There are three layers through which they can steal users‟ private information.
of protection against a phishing attack - client, server and Phishing has become more threatening and costly for
managerial layer. It is known and further shown in this both organizations and consumers as technology evolves.
research that a phishing attack is not a completely successful According to the Anti Phishing Work Group, brand domain
hit unless all the layers involved in the attack are pairs increased up to a record of 92% from the beginning of
circumvented. So far, no one approach or methodology has 2009 and the number of unique phishing web sites detected
sufficiently countered phishing attacks; they either err on the in June 2009 was 49,084, the highest record in history since
client side, server side or managerial layer. This paper is an 2007. These targeted mostly payment services and
attempt to rectify this with a multilayered protection financial institutions. Phishing proliferates because phishers
framework based on game theory and anti-phishing continuously research anti-phishing countermeasures and
protection at each layer. Game theory offers a way to take
adjust their attack methods, either to exploit weaknesses in
advantage of the social interaction evident in the perpetration
of phishing attacks as a means to combat it. The paper first
the countermeasures, or absolutely outsmart them.
provides an analysis of typical phishing attacks in a use case in Moreover, it is known, and further shown in this work
terms of all the major actors and the roles they play. Then, that a phishing attack is not a completely successful hit
models, flow charts and algorithms to determine the optimum unless all the layers involved in the attack are
multilayered protection strategy are introduced. The proposed circumvented. So far, no one approach or methodology has
novel technique to combat phishing is based on the interaction holistically countered phishing attacks; they either err on
between phishers and anti-phishers in a game scenario - the the client side, server side or managerial layer. The
game approach handles the dynamic and transient nature of sophistication of the more recent phishing scams shows that
phishing attacks both reactively and proactively as the an efficient solution to phishing requires a multi-layered
multilayered defense prevents a single point of failure using defense approach that prevents a single point of failure and
the gaming strategy to strategically calculate and pre-empt the ultimately thwarts phishing attempts.
moves of the attacker. A multilayered approach would employ anti-phishing
Keywords - strategies at different layers of an attack; this is crucial in
effectively combating phishing attacks. This paper presents
Phishing; Game theory; Multilayered Framework; Attacker, a theoretical framework for combating phishing using game
Phisher. theory. Game theory attempts to mathematically capture
I. INTRODUCTION behaviour in strategic situations, in which the success of an
Phishing is a variety of online identity theft, which individual's choices depends on the choices of others. This
combines social engineering and technical maneuver. It is a theory has led to revolutionary changes in economics and
major threat to information security and privacy (of in recent times has found diverse applications in computers
financial institutions, retail companies, online stores, social and information security, where useful results have been
networks, national tax agencies and individuals). The obtained.
common objective regardless of the attack medium or setup Constructing a model of an attack using game theory
is to steal confidential information. For example, through provides valuable insight into a phisher‟s methodology.
social engineering, unsuspecting users browse sham web This suggests a blueprint for devising a defense-in-depth
sites via spoofed emails that lure them with security strategy that predicts and responds to the moves of the
urgencies or lawful sounding statements, and more often attacker. This paper is focused on highlighting the
than not, users are easily convinced that counterfeit pages inadequacies of independent client side, server side and
enterprise layer phishing countermeasures, showcasing the
most successful phishing attacks and developing a
multilayered framework to be used in the game scenario in
order to combat phishing attacks.
A. Background on Phishing framework component selection, we depict a typical
There have been laudable efforts by researchers in phishing attack in the use case diagram shown in Figure 1.
developing anti-phishing solutions, some of which are
incorporated in our proposed multilayered framework.
However, for a better understanding of the reasons for our

Figure 1. Use Case diagram for a phishing attack

Registrar, Victim, and Brand institution/Server ends, (see


Figure
The major actors are depicted as the stick1.figures anddiagramalso
Use Case for Figure 2). These
a phishing attack are hitherto and henceforth referred to
the action/process they are responsible for or take part in as in this paper as enterprise, client side and server side layers
the case may be are shown in the oval shapes. respectively. In our proposed game theoretical model, a
From the use case diagram, the phisher first registers a combination of these three makes Player_1, while the
domain or compromises an existing brand phisher makes Player-2. Also, for the purpose of this
institution/server. Then he sends out the snare to the victim research and our approach, „attackers‟ and „phishers‟ are
in the form of emails, instant messages or other means used interchangeably.
shown in the case. In the long run, if the victim falls for the B. Related Research
snare, then the victim supplies sensitive details – social Previous research has successfully integrated
insurance numbers, pin numbers, passwords, user name and independent solutions together as a multi layered strategy
so on, which are harvested by the phisher. At this point, in mitigating other security threats but none has featured its
the phisher either sells these details to third party criminals application in fighting phishing attacks. In recent times
or uses it personally at the brand institution server. The game theoretical approaches have also proven very
most common of the several techniques used to ensnare the effective in approaching security related issues involving
victims is via spoofed emails. Most times, with thousands human interactions. A few of these are referred to below.
of mails sent out there are only a few hits, but that is Meharouech et al [1] proposed a security infrastructure
sufficient for a successful phishing attack. Alternative that encompassed multiple security devices to form an
means of getting the snare out to the victims includes IRC, inclusive security layer. Each security component was
IM, phone, and mail. Another notable means used is DNS defined with respect to the others; choice of the best
poisoning of legitimate web sites, which ultimately diverts solution to combat a malicious attack was carried out
the information that users enter to the phisher's server and dynamically and automatically by interactions among the
in some cases the site is redirected to the legitimate site security components. Also, Marshal [2] combined a
[16]. Subsequently, the attacker tries to exploit the sensitive number of proven best of anti-spam techniques applied in
information gathered at the server end to divert funds, make successive layers to achieve true defense-in-depth against a
transactions or in some cases sell to third parties. range of spam, phishing and other email-borne threats.
The consequence of the successful phishing attack is While their approach handled a good portion of the client
usually a loss to the victim or the brand institution. To the side attacks and some server side attacks, a notable
victim, the loss could be identity or financial, while to the limitation to their work was the absence of a layer that
brand institution, the loss could be brand identity, consumer properly handles the enterprise layer of the defense,
trust, or cost of remediation. including ISPs and domain registrars.
Now, the focal points from the use case diagram where Furthermore, as a result of its imperative function in
anti-phishing solutions are being deployed include: The decision-making, control and study of interactions among
interdependent rational players, game theory has trained or predetermined set that may overlook unknown or
increasingly drawn researchers‟ attention. Miura-Ko et al new phishing sites.
[3] used the game theoretic model to investigate the B-Apt has been experimentally proven to detect 100%
interdependent nature of security investments, representing of phishing sites while its other anti-phishing counterparts –
the additional costs or benefit incurred by one player due to IE, Firefox, Netcraft and SpoofGuard – detected 42%, 55%,
the other players‟ actions. Hamilton S.N et al [4] also noted 88%, and 63% respectively [11], [12]. It relies on a list of
three major advantages derived from utilizing game theory known legitimate URLs – a white list – in order recognize
in information warfare. These advantages include legitimate login sites and reduce the odds of producing too
suggestion of several potential courses of actions with many false positives. The white list is a comprehensive list
predicted outcomes as well as their efficacy in analyzing of financial institutions, e-commerce sites, service
what-if scenarios, allowing detailed analysis of important providers, and major sites with login pages, which are
chains of events used at a later period. Lye et al [5] stored together as tuples. The stored login tuples aids the
presented a game theoretic method for viewing interactions user‟s decision when a phishing site is detected and asks
between an attacker and the administrator as a two-player the user if he wants to be redirected to the legitimate site
stochastic game; using a nonlinear program assuming state [11], [13]. However, this tool depends on the users‟
transition probabilities, Nash equilibra/best response decision to be directed to the legitimate site or not.
strategies for the players were computed.
Wei He and Sallhammar k. [6], [7] presented a game
theoretical attack-defense model which computes risk ii. Justification for the selection of B-APT with regards
(according to the cost benefit analysis) of the system based to other anti-phishing tools: Several other anti-phishing
on the predicted behaviours of the attackers. To the best of techniques, tools and algorithms depend on black listing,
our knowledge, there has been no multilayered game users‟ history of URLs, heuristic based schemes and hybrid
theoretical approach for solving phishing problems as approaches. These have been deficient because, firstly, the
explored in this research. However, this research is based blacklist involves the use of known phishing sites. A major
on a similar idea to Meharouech et al's [1] and Miura-Ko et drawback of black listing techniques is the delay in keeping
al [3] game theoretic approaches. In this approach, the the list up to date, as several phishing sites are short lived;
multilayered anti-phishing solutions player would while for the history of URLs visited, sites that are not
systematically decide among the complementing options, visited are omitted in the list. Another challenge this poses
is that the history of URLs might not be a large enough set
the best strategy to defeat the phishers‟ move.
as the whitelist, which is a reasonably updated list of
II. COMPONENTS OF THE PROPOSED MULTI- legitimate sites. The heuristics based approach is basically
LAYERED FRAMEWORK dependent on educated guesses and experiences featuring
In this framework the multi-layer defense approach is details such as images, URLs, passwords and links as
used: if there is a vulnerability that can be exploited, proposed in [14] and can be likened to a trial and error
employ control strategies to increase the attacker‟s cost. approach. The hybrid schemes are blends of any of the
The multilayered framework leverages existing effective whitelist, blacklist, history of URLs or heuristic, and are
anti-phishing solutions. This section highlights the selected accompanied by their respective drawbacks as well. Other
anti-phishing solutions for the different layers in the notable anti-phishing techniques rely on the users to detect
framework, the desired attributes in the components and visual similarities between legitimate and illegitimate sites,
some justification for the selection of these tools. training the users to recognize or look out for legitimate
security features on sites. These have not proven effective
A. Client Side Layer on a large scale because of the sophistication of most recent
This layer involves the use of automated tools to make phishing kits, and ignorance on the part of users [15]. So
up for lack of, or inadequate user education and awareness far B-Apt has been proven to be more effective in making
as a good human component in detecting and avoiding up for each of the highlighted drawbacks as it uses
phishing attacks. The automated tools considered for the Bayesian analysis with its B-Apt engine and user interface
proposed framework includes: B-APT and BogusBiter. [11].
They are as discussed below, with justification for their
relevance in our proposed multilayered framework. iii. Analysis of BogusBiter: BogusBiter is a client side
i. Analysis of B-APT: the Bayesian anti-phishing toolbar anti-phishing tool that uses obfuscation in an attempt to go
has recorded more success in recognizing phishing sites beyond the preventive approaches highlighted earlier in this
than counterpart toolbars because it is based on the paper. The researchers‟ idea is aimed at protecting the
Bayesian filter, a popular classification method in spam users‟ sensitive information even if they fall for the
filtering. This success in recognizing phishing sites is phishers‟ snare, by obfuscating the user‟s sensitive details
attributed to its efficiency in flagging unregistered spam entered in the phishing site with other gibberish details,
emails, a feature that makes it very effective, as many thus, increasing the phisher's cost of accessing the sensitive
phishing sites are transient with zero day life span and new details. Accordingly, even though the user has the sensitive
ones surface day by day [9], [10]. This is unlike a details hidden among others, he has no way of testing the
conventional signature based method that filters based on a credentials for validity, as financial institutions, brand
institution sites and so on; don‟t make their databases Thus, for our framework, another desirable feature for the
publicly available [16]. server side layer is strong authentication, employing a
combination of what the user knows, has or is. The other
iv. Justification for the selection of BogusBiter with components of the server side layer that enhance the
regards to other anti-phishing tools: This component of validity of strong authentication, when used are: finger
defense is necessary because other existing anti-phishing printing and password hashing as discussed below.
techniques are preventive in nature and depending on them
alone is not enough to thwart a phishing attack. One of the i. Finger Printing: Challenge/response as well as the
desirable traits in BogusBiter for this multilayered PKI-based authentication has also been proven to be very
framework is that the phishing site, is given “bogus bites”, effective in preventing phishing attacks, by sternly
which are either a combination of the users sensitive details matching each response to a specific authentication
concealed among other gibberish, or which renders the attempt. In the case of the PKI-based authentication, we
users sensitive details indistinct from the gibberish. Among can regard, as a response, the server‟s challenge‟s digital
other desired characteristics for this multilayered signature. We consider this a very vital component for our
framework is the independence of BogusBiter from other framework because the fingerprints generated through these
detection techniques. When anti-phishing tool bars are authentication schemes would ensure that a person is who
enabled, the most commonly observed user behavior he claims to be [20].
towards phishing sites is that users ignore detection
warnings or make uninformed responses to prompts or ii. Password Hashing: Also, for our multilayered
security features and signals [17], [18], [19]. Therefore, a framework, we deem password hashing a very essential
desirable feature for this multilayered framework is a major protection mechanism both at the client side and the server
role played by BogusBiter; that is, even if users ignore side layers. This way, all outgoing passwords entered from
security warnings from the detection tool and fall prey by a user‟s end is hashed with the salt of the legitimate domain
supplying their sensitive details to the phishers, their name. Therefore, even if the sensitive details were entered
sensitive details should still be protected to a reasonable onto the phishers site, the authentication process at the
extent. When bogus biter intercepts the users‟ sensitive server end would fail because the salt to the hash is the
details and conceals them with the bogus bite, the process domain of the legitimate site [21], [13].
is transparent to the user and still leverages the economics C. Enterprise Layer
of security, i.e., to increase the cost of the attack above the The enterprise layer required in this framework is
value of the asset attacked. approached from two perspectives: 1) Systems based and 2)
B. Server Side Layer Process based. This is because indicators show that
At this layer we use brand institution and server phishing attacks can‟t be curbed only through technological
interchangeably as well as incorporate the justification for methods, but also through frequently occurring global
our selection of anti-phishing mechanisms into the punitive actions that would significantly diminish the space
discussions rather than explicitly. in which phishers operate [20], [23].
The major server side component of our framework is i. System Based Enterprise Layer: The major
an extension of the obfuscation scheme used by the characteristic feature of the systems based anti-phishing
BogusBiter discussed above. We consider this essential enterprise layer is to trigger the alerts that would be sent to
because merely concealing the users‟ sensitive information the ISPs, registries and registrars to respond accordingly.
among other gibberish details could be viewed as security The response could be suspending or taking down the
through obscurity. This form of security is only good as domain, or to initiate the litigation of the criminals
long as we do not rely on it completely. For instance, if the involved. Once a phishing attack is detected, the domain
phisher tries to carry out a dictionary attack to get a user‟s WHOIS is also activated to confirm the root source of the
sensitive details – trying the exhaustive possibilities in the domain. At this point, we stress the necessity for
bogus bite – then the server end algorithm of BogusBiter cooperation among ISPs, registrars and registries in
triggers stolen credential identification to the brand thwarting phishers and decreasing the number of phishing
institution server in a timely fashion. Therefore, even if victims. If ISPs responsively take sites down and there is
eventually the phisher tries the correct credential and the no corresponding action from the registrars, then the site
authentication process succeeds, the brand institution could be brought back up again by another ISP or moved to
would have been notified and the transaction is blocked another domain, as has been observed in the past. Phishers
[16]. Our multilayered framework incorporates this also work around the clock to gather their “phishes”; thus ISPs
because the algorithm works seamlessly with the existing and domain registrars should endeavour to work around the
effective authentication schemes used by servers some of clock, in shifts if possible, to ensure that legitimate requests
which are discussed next. for sites or domain take-downs are treated with a sense of
Commonly used authentication schemes that have been urgency. Time plays an important role in the phishing
somewhat effective on the server end involve the use of a game.
shared secret between the server and the client. Again this
is only as good as long as the shared secret remains secret.
ii. Process Based Enterprise Layer: This aspect of the Domains that do not meet regulations should either not
enterprise layer is meant to function in a twofold fashion as be registered in the first place or be shut down as soon as
well: detective and proactive. they are detected. There should also be enforced penalties
Meting out disciplinary actions against phishers by law for registrars or ISPs who do not comply. We propose that
enforcement agents has been hampered by a number of there should be regulations to clamp down on free web
factors, which include tracking and identifying the real hosting sites that offer web spaces to anyone without
source of domains, as well as construing international laws proper checks, because these web spaces have been
in attempts to prosecute. Consequently, phishing is fast breeding grounds for phishers as well.
becoming a crime committed by criminals immune to
D. Framework: Integration of Components in the three
international laws [22]. This suggests that there is a dire
layers
need for global response and collaboration from all
countries to combat phishers adequately. To add credence The sole aim of this framework is to ultimately prevent
to this, statistics show that drastic global actions yield phishing attacks or, in the worst case, thwart phishers‟
effective results, and a good example of this is the US attempts by optimization of the interoperation among anti-
based McColo server shutdown in November 11th 2008, phishing solutions.
which resulted in significant drop in phishing attacks i. Underlying Assumption for the integration, and its
emanating from the US, and other countries (such as China) implication: This proposed multilayered framework is put
known for spam and phishing attacks [25]. A most recent forward based on the assumption that each of the anti-
laudable effort according to ComputerWorld- Security, is phishing solutions analyzed above in the previous sections
the “Operation Phish Phry” by the FBI, with a record of is in itself sufficient to handle the area for which it was
about 100 arrests in the US and Egypt. Conversely, the sad designed, i.e. client side, server side or enterprise layer.
trend is that the volume of these attacks did not reduce: the Therefore, integrating them as a single unit would give a
phishers only moved their bases to other countries. They complementing and coalition effect, thus, prevent a single
see these countries as safe havens for operation partly point of entry for the attacker.
because the regulations in these countries create an Besides, each layer has been conceptualized differently
environment for them to thrive through weakly with the various anti-phishing solutions handling the
implemented regulatory policies, delay in punitive actions areas/layers for which they were designed. Our question
or in the worst case, nonexistent regulatory policies. This therefore is: what happens to the layer unattended in the
suggests that the most effective action against these attacks feat to curb phishing? Since the phisher has to succeed in
require a joint global effort in order to eradicate the spaces all three layers involved because phishing is not completely
considered safe enough for these malicious domains to successful without success at each of the layers as a whole,
thrive. i.e., without the sites being registered or brand institution
To this end, we recognize the need for speedy and domains being compromised, the attack cannot proceed to
drastic action required to curb phishing attacks or forestall the next phase in its life cycle – luring the victims to the
the spread of the phishers net because, over time the snares.
observable trend is that; to avoid detection, phishers put up
their sites for just a short period and bring it back up again ii. Attack/Defense Prompter Algorithm and Flow Chart:
at a later period. Therefore, any effective approach would The flow chart shown in Figure 2 below is based on the
be active enough to either prevent those sites from being up algorithm that follows:
in the first place or detect them at first sight. For any Attack x
All that has been discussed above are inclined towards Where x=0, 1, 2, …, n
detective and corrective actions in the enterprise layer. For If x targets client layer,
the proposed framework to be truly effective and holistic in Call CS()
its defense it also emphasizes the need for a proactive Else
measure. If x targets server layer,
We propose that just as business name registration is Call SS()
being tightly controlled through background checks, the Else
Internet space in terms of domain name registration and If x targets enterprise layer,
governance should be treated in the same light. There Call EL()
should be adequate checks of what the site/domain is to be
Else
used for, a close audit of the activities that take place on the
Process packet
site or domain, and focused web crawling activities to
detect duplicate sites and stolen brands. End if
As soon as suspicious activities or URL naming are End if
noticed, there must be penalties for non-compliance to the End if
domain usage agreement, starting with the suspension and End For
ultimate take down of the domain.
Where: CS= Client Side Layer, SS= Server Side Layer, Tz=Target EL, x= 0,1,2, …,N, y=0,1,2, …,M, z=0,1,2,…,P.
EL= Enterprise Layer, Tx= Target CS, Ty= Target SS,

Figure 2. Attack/defense prompter flow chart

The flow chart and the algorithm show the decision  Strategies- choices and combinations of moves the
process that takes place within the multilayered framework players can make.
when any phishing attack x is launched with any of the  Payoffs- profit or utility derived from the choice of
phishers‟ techniques. It begins with the assumption that all strategies.
traffic received by a client (see Figure 1) is first treated as a Our game is a two player game – our multilayered
phishing snare. Hence, for all attacks Tx, targeting client framework (Player_1) and the phishers (Player_2). On the
side, Ty, targeting server side, and Tz targeting enterprise one hand, Player_1 can choose among the three broad
layer, the game theoretic model GTM is activated. A categories of strategies: client side, server side and
simultaneous process ensues afterwards among the various enterprise layer strategies. On the other hand, we can also
components to determine the appropriate routines – CSR categorize the phishers‟ techniques and strategies into three
and or SSR and or ELR that can best counter any given broad categories: client layer, server layer, and enterprise
attack otherwise the client proceeds with the traffic to as a layer strategies.
legitimate one depicted as the connector A in the flowchart. At this point, to describe the payoffs we would use the
A further detail of how the optimum strategy is selected following notations: let v be the value of the sensitive
through the GTM is explained in section three. details being protected and let d be the defence strategies
employed by Player_1 at the various layers to increase
III. GAME THEORETICAL DEFENSE Player_2‟s cost or reduce the payoff.
Game theory is a mathematical structure for exploring
what choices rational individuals will make, when the A. The Game Scenario
payoffs depend on the possible combination of all player's The game theoretic model in Figure 3 helps us to
strategies and moves. capture the scenario in which attacker and defender value
Some research has been done to develop game theoretic the same asset. In this case, the user‟s sensitive details or
approaches for modelling intelligent and rational actors, confidential data is the asset, the attacker is the phishers‟
especially with regards to attacker defender scenarios. In techniques and the defender is our multilayered framework.
general terms, a game consists of three major components: On the whole, the game is an incomplete information game
 Players- actors with motivations, which determine as we assume that both players are not aware of the
decisions they make. strategies and resources at each other‟s disposal. The game
is also described in the form of a non-cooperative zero-sum SSR (Server Side Routine), and ELR (Enterprise Layer
game between the two players. The initial position of the Routine), are called up when necessary as GTM (Game
game could be either on Player_1‟s side or Player_2‟s side. Theoretic Model) (see section IIIB) is activated at the
For example, on players 1‟s side it could be by a proactive launch of attacks Tx= Targets CS, Ty= Targets SS,
defense strategy and on Player_2‟s side it could be the Tz=Targets EL, where x= 0,1,2, …, n, y=0,1,2,…,m,
launch of a phishing attack. In this model, CS() ( Client z=0,1,2…,p., and P is the Multilayered
Side Function) SS() (Server Side Function), EL() (prevention/detection/response) defense strategy.
(Enterprise layer Function), CSR (Client Side Routine),

Figure 3. Multilayered defense model based on game theory

B. Game Theoretical Model (GTM) Mechanism layer of the framework, once the phishing site has been
It is assumed that each player in this game is rational confirmed to be such, and while other counter routines are
and the multilayered defense framework (Player_1) would also called from the server and client side layers, a
be adaptive to calculate the moves of the attack towards corresponding action is triggered in the systems based
winning the game, thus, an unsuccessful hit for the phisher enterprise layer. This leads to an alert being sent to the
(Player_2). Also, in this zero sum game, the payoff for ISPs, domain registrars, registries and domain owners to
Player_1 would be a gain if Player_2‟s profit is take down the site; or in the case of hijacked brand, domain
significantly reduced or null. owners are duly informed to protect their legitimate
For every given attack Tx, Ty or Tz, the algorithm with customers. At this point, accessing the domain WHOIS
the most appropriate functions is called up to counter the information in real time plays a very vital function in
launched attack. The process in which the functions are making the shutdown process by registrars or registries,
called up can be likened to following through a decision and takedown services act within the shortest space of time.
tree for their strategic moves. For example, in the enterprise

Table 1. A matrix of possible strategies of Player_1 and Player_2


The matrix shown in table 1 represents the possible attack with a use case diagram. Consequently, we present
combinations of strategies and techniques used by both the need for a multilayered defence in-depth framework
players in the game. Cv, Sv, Ev are the values placed by the with characteristic features of what effective components
multi-layered defense on the asset- sensitive details with should be.
respect to each layer, and Cd, Sd, Ed are the defence Saying with absolute confidence that we know our
strategies placed by the multi-layered defense on the assets- attackers‟ strategies completely would be to undermine the
sensitive information. An unprotected state in the game for phishers but we do know for sure the characteristics of their
Player_1 would be when Cd, Sd, or Ed is zero or does not attack strategies and the major categories for which to
exist. classify, identify and detect them.
The expected contributions to knowledge of this paper
Based on assumptions made in Section III for the
include the following:
payoffs, if Player_2 succeeds at client side, then Player_2 • Facilitate the understanding of and proffer effective
gets a payoff of pCv, and pSv, pEv at the server side and measures to combat phishing attacks through a
enterprise side respectively. multilayered defense approach, achieved primarily by
Players 1 and 2 use either a strategy or combination of preventive, early detection and reaction, as well as
strategies to maximize their payoffs or minimize their management schemes.
losses as shown in Table 1. We presume that a phishing • As phishing is perpetrated through social engineering,
attack would not be a successful hit until the phisher we use the game theory to depict, explain and forecast the
succeeds at the client side, i.e. first getting the client‟s possibility of success for the multilayered framework
sensitive details (thus getting Cv) and finally authenticating (Player_1) over the phishers (Player_2). This illustrates the
at the server end to get the asset of concern (getting Sv). interaction between phishing attacks and anti-phishing
Also, another possible way of accessing the asset Cv could solutions from a social perspective. Hence, this could be
be at the server side, when the brand server is used as a basis for designing better anti-phishing solutions.
compromised. Thus Player_2 not only has a likelihood of • We conjecture that the approach proposed in this
getting Sv at server side but also Cv. Therefore, it is paper will significantly advance the knowledge and tools
imperative that Sd be strong enough to limit Player_2‟s required to enhance secure online transactions and increase
chances of a high payoff. For example, from Table 1, it the associated users‟ level of confidence.
follows through that a phisher‟s gain with a technique Finally, including other tested and proven anti-phishing
combination of C|S facing a defense strategy Cd|Sd would solutions at each of the layers involved might further
be dependent on ((Cv + Sv) - (Cd + Sd)), i.e. the cost of the enhance our proposed multilayered framework. This might
defense. The cost for the other possible combinations is as help improve the strategy space of the defense game.
shown in the table as well. Suggestions for future work include design questions
The Utility of Player_2 would therefore be: U2= p( Cv + based on the framework, the known characteristic set of
Sv ±Ev), while for Player_1 U1= U2→0 (since our goal is to phisher behaviour and the expected non-exhaustive
reduce or eliminate Player_1‟s utility completely). We combination and permutation of strategies that could be
surmise that for U2 to tend towards zero, the defence derived from the multilayered Player_1. Exploring the
strategy at the right most bottom cell -((Cv + Sv + Ev) - (Cd multilayered framework as a cooperative game with
+ Sd + Ed)) would yield a higher payoff for Player_1 if at coalition among the interoperable components is
every point in time Player_1‟s defence strategies P 1Ms (our recommended for further work as well as deriving Nash
multilayered framework components) is a superset of equilibrium for the most optimum defence strategy used by
Player_2‟s techniques P2Pt – i.e. P2Pt ⊆ P1Ms . Player_1.

C. Limitations V. AKNOWLEDGEMENTS
The scope of this work is mostly theoretical. Also, it is
worth noting that game theoretic approaches to defence The research was supported by the Concordia Faculty of
strategies against intelligent and dynamic attackers such as Professional Education and Faculty of Graduate Studies.
phishers are based on a wide range of assumptions whose The first author is heartily thankful to her supervisors,
accuracy and implications have not been fully explored. Pavol Zavarsky, Ron Ruhl and Dale Lindskog whose
Extensively exploring their implications and accuracy encouragement, guidance and support from the initial to the
would no doubt make them yield real time benefits in the final level, enhanced significantly both the quality of the
space they are being deployed. content and clarity of the presentation of this work.
REFERENCES
IV. CONCLUSIONS [1] M. Sourour, B. Adel, and A. Tarek,”Ensuring security in
In order to give a holistic approach to combating depth based on heterogeneous network security
phishing attacks putting into account the rationality of the technologies” Regular Contribution on computer security ,
key actors, this paper introduces game theory to model the Springer-Verlag 2009.
attack and defence activities. We analyze a typical phishing [2] Marshal, “Marshal‟s Malware defense-in-depth anti spam
engine” January 2008.
[3] R. A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos, [12] M. Blaisi, “Techniques for detecting zero day phishing
”Security decision-making among interdependent websites”, Iowa State University. 2009
organizations”, 21st IEEE computer security foundations [13] N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C.
symposium 2008. Mitchell. “Client-side defense against web-based identity
[4] S. N. Hamilton, W. L. Miller, and A. Ott, “The Role of game theft”,. In NDSS ‟04, 2004.
theory in information warfare”, 4th Information survivability [14] C. Yue and H. Wang, “Anti-Phishing on offense and
workshop (ISW-2001/2002), www. cyberdefenseagency.com Defense”, http://www.cs.wm.edu/~hnw/paper/anti-phishing
[5] K. Lye, J.M. Wing, “Game strategies in network security”, pdf
International Journal of Information Security, Preface to the [15] J. S. Downs, M. B. Holbrook, and L. F. Cranor. “Decision
special issue of selected papers from CS/VERIFY 2002, Vol. strategies and susceptibility to phishing.” In Proceedings of
4, Numbers 1-2, Springer Berlin / Heidelberg, Feb. 2005, pp. the SOUPS, pages 79–90, 2006.
71-86
[16] R. Dhamija and J.D. Tygar and M. Hearst. “Why phishing
[6] W. He, C. Xia, H. Wang, C. Zhang, Y. Ji, “A game works.” In Proceedings of the CHI, pp. 581–590, 2006.
theoretical attack-defense model oriented to network security
risk assessment” Beihang University, Interntional conference [17] T. Whalen and K. M. Inkpen. “Gathering evidence: use of
on computer science and software engineering, 2008 visual security cues in web browsers.” In Proceedings of the
conference on Graphics interface, pages 137–144, 2005.
[7] K. Sallhammar, “Stochastic Models for Combined Security
and Dependability evaluation” [Ph.d], Norwegian University [18] T. Weigold, T. Kramp and M. Baentsch, “Secure
of Science and Technology, Trondheim, June 2007. Authentication: Remote Client Authentication”, IEE
Computer Society, Security & Privacy, 2008.
[8] Anti-Phishing Working Group. “Phishing Activity Trends
Report. 1st Half 2009” : http://www.anti- [19] B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell,
phishing.org/reports/apwg_report_h1_2009.pdf “Stronger password authentication using browser
extensions.” In Proceedings of the 14th Conference on
[9] C. V. Zhou, C. Leckie, S. Karunasekera and T. Peng, "A USE_IX Security Symposium - Volume 14 Baltimore, MD,
Self-healing, Self-protecting Collaborative Intrusion July 31 - August 05, 2005.
Detection Architecture to Trace-back Fast-flux Phishing
Domains", The 2nd IEEE Workshop on Autonomic [20] J. Lance, “Phishing Exposed” Rockland, mass: Syngress
Communication and Network Management (ACNM 2008), Pub., c2005, ISBN: 159749030x
Brazil, April 2008. [21] E. Mendelson, “Introducing game theory and its
[10] P. Likarish, E. Jung, D. Dunbar and T.E. Hansen, “B-APT: Applications”, Chapman & Hall/CRC, ISBN 1-58488-300-6
Bayesian anti-phishing toolbar”, IEEE Conference on [22] V.M. Bier, M.N. Azaiez, “Game Theoretic Risk analysis of
Communications, 2008. ICC'08, 2008 - mnet.skku.ac.kr Security Threats”, Springer, ISSN: 0884-8289
[11] W. Yerazunis. “The spam-filtering accuracy plateau at 99.9 [23] IBM Global Technology Services, IBM Internet Security
percent accuracy and how to get past it”, In MIT Spam systems X-Force 2008 Trend & Risk report.
Conference 2004, December 2004.

You might also like