Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gary Warner is active.

Publication


Featured researches published by Gary Warner.


Proceedings of the 3rd ACM workshop on Artificial intelligence and security | 2010

Lexical feature based phishing URL detection using online learning

Aaron Blum; Brad Wardman; Thamar Solorio; Gary Warner

Phishing is a form of cybercrime where spammed emails and fraudulent websites entice victims to provide sensitive information to the phishers. The acquired sensitive information is subsequently used to steal identities or gain access to money. This paper explores the possibility of utilizing confidence weighted classification combined with content based phishing URL detection to produce a dynamic and extensible system for detection of present and emerging types of phishing domains. Our system is capable of detecting emerging threats as they appear and subsequently can provide increased protection against zero hour threats unlike traditional blacklisting techniques which function reactively.


acm symposium on applied computing | 2008

Mining spam email to identify common origins for forensic application

Chun Wei; Alan P. Sprague; Gary Warner; Anthony Skjellum

In recent years, spam email has become a major tool for criminals to conduct illegal business on the Internet. Therefore, in this paper we describe a new research approach that uses data mining techniques to study spam emails with the focus on law enforcement forensic analysis. After we retrieve useful attributes from spam emails, we use a connected components clustering algorithm to form relationships between messages. These initial clusters are then refined by using a weighted edges model where membership in the cluster requires the weight to exceed a chosen threshold. The results of the cluster membership are validated by WHOIS data, by the IP address of the computer hosting the advertised sites, and through comparison of graphical images of website fetches. This technique has been successful in identifying relationships between spam campaigns that were not identified by human researchers, enabling additional data to be brought into a single investigation.


2011 eCrime Researchers Summit | 2011

High-performance content-based phishing attack detection

Brad Wardman; Tommy Stallings; Gary Warner; Anthony Skjellum

Phishers continue to alter the source code of the web pages used in their attacks to mimic changes to legitimate websites of spoofed organizations and to avoid detection by phishing countermeasures. Manipulations can be as subtle as source code changes or as apparent as adding or removing significant content. To appropriately respond to these changes to phishing campaigns, a cadre of file matching algorithms is implemented to detect phishing websites based on their content, employing a custom data set consisting of 17,992 phishing attacks targeting 159 different brands. The results of the experiments using a variety of different content-based approaches demonstrate that some can achieve a detection rate of greater than 90% while maintaining a low false positive rate.


2008 eCrime Researchers Summit | 2008

Automating phishing website identification through deep MD5 matching

Brad Wardman; Gary Warner

The timeliness of phishing incident response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through a method of comparing new URLs and their associated Web content with previously archived content of confirmed phishing sites. The results can be used to automate shutdown requests, to supplement traditional ldquoURL black listrdquo toolbars allowing blocking of previously unreported URLs, or to indicate dominant phishing site patterns which can be used to prioritize limited investigative resources.


2009 eCrime Researchers Summit | 2009

Identifying vulnerable websites by analysis of common strings in phishing URLs

Brad Wardman; Gaurang Shukla; Gary Warner

It has been shown that most phishing sites are created by means of a vulnerable web server being re-purposed by a phisher to host a counterfeit website without the knowledge of the servers owner. In this paper, we examine common vulnerabilities which allow these phishing sites to be created and suggest a method for identifying common attack methods, as well as, help inform webmasters and their hosting companies in ways that help them to defend their servers. Our method involves applying a Longest Common Substring algorithm to known phishing URLs, and investigating the results of that string to identify common vulnerabilities, exploits, and attack tools which may be prevalent among those who hack servers for phishing. Following a Case Study approach, we then select four prevalent attacks that are suggested by our methodology, and use our findings to identify the underlying vulnerability, and document statistics showing that these vulnerabilities are responsible for the creation of phishing websites. Digging further, we identify attack tools created to exploit these vulnerabilities and how they are detected by current intrusion detection signatures. We suggest a means by which this work could be integrated with Intrusion Detection Systems to allow webmasters or hosting providers to reduce their vulnerability to hosting phishing websites.


conference on email and anti-spam | 2011

Evaluating a semisupervised approach to phishing url identification in a realistic scenario

Binod Gyawali; Thamar Solorio; Manuel Montes-y-Gómez; Bradley Wardman; Gary Warner

Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs. In reality, the number of phishing URLs received through these spam emails is fewer compared to other URLs. Our study is targeted to detect phishing URLs in a realistic scenario of a highly imbalanced data set containing phishing and spam URLs with 1:654 ratio. To train a learning algorithm labeled URLs are needed, where manual labeling is a common approach. Given that it is not feasible to manually label all the URLs from large data sets, we propose reducing manual intervention by labeling only 10% of the URLs manually and using a semisupervised learning algorithm. We compare the proposed approach with a supervised learning approach. Evaluation results show that our proposal is competitive if it is applied in combination with appropriate feature selection and undersampling techniques.


acm symposium on applied computing | 2009

Clustering malware-generated spam emails with a novel fuzzy string matching algorithm

Chun Wei; Alan P. Sprague; Gary Warner

In this paper, a fuzzy-matching clustering algorithm is introduced to group subjects found in spam emails which are generated by malware. A modified scoring strategy is applied in dynamic programming to find subjects that are similar to each other. A recursive seed selection strategy allows the algorithm to detect similar patterns even when the spammer creates a variation of the original pattern. A sliding threshold based on string length helps to minimize false-positives. The algorithm proves to be effective in detecting and grouping spam emails using templates. It also helps spam investigators to collect and sort large amount of malware-generated spam more efficiently without looking at the email content.


The Journal of Digital Forensics, Security and Law | 2010

Reeling in Big Phish with a Deep MD5 Net

Brad Wardman; Gary Warner; Heather McCalley; Sarah Turner; Anthony Skjellum

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBIs Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this particular form of online criminal activity. This research presents a means to correlate phishing websites by showing that certain websites are created by the same phishing kit. Such kits contain the content files needed to create the counterfeit website and often contain additional clues to the identity of the creators. A clustering algorithm is presented that uses collected phishing kits to establish clusters of related phishing websites. The ability to correlate websites provides law enforcement or other potential stakeholders with a means for prioritizing the allocation of limited investigative resources by identifying frequently repeating phishing offenders.


international conference on digital forensics | 2011

Analysis of Back-Doored Phishing Kits

Heather McCalley; Brad Wardman; Gary Warner

This paper analyzes the “back-doored” phishing kits distributed by the infamous Mr-Brain hacking group of Morocco. These phishing kits allow an additional tier of cyber criminals to access the credentials of Internet victims. Several drop email obfuscation methods used by the hacking group are also discussed.


2011 eCrime Researchers Summit | 2011

Phishing: Crime that pays

Philip J. Nero; Brad Wardman; Heith Copes; Gary Warner

Email phishing requires functional countermeasures, as does any crime that results in millions of dollars in yearly losses. Many financial institutions currently combat phishing by contracting takedown companies that remove relevant phishing websites as soon as possible after they are detected. By comparing the median time necessary for professionals to take a phishing website down to the average time it takes for a phishing website to turn a profit for its creator, I have demonstrated the overall ineffectiveness of the takedown process. On average, takedown companies fail to eradicate phishing websites before their creators garner valuable information from multiple victims. Furthermore, forensic evidence that could lead to the arrest of the cybercriminals responsible for the phishing websites is often ignored because these takedown companies do not profit from cooperating with criminal investigations. Hence, there is no deterrence against phishing. An anti-phishing protocol that involves website takedown, but also includes investigation and eventual prosecution would likely be more effective than a self-perpetuating system that concludes after a malicious website is terminated.

Collaboration


Dive into the Gary Warner's collaboration.

Top Co-Authors

Avatar

Alan P. Sprague

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Anthony Skjellum

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Chengcui Zhang

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Chun Wei

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Ragib Hasan

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Bradley Wardman

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Jason Britt

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Shams Zawoad

University of Alabama at Birmingham

View shared research outputs
Top Co-Authors

Avatar

Thamar Solorio

University of Alabama at Birmingham

View shared research outputs
Researchain Logo
Decentralizing Knowledge