An empirical study: automated subdomain takeover threat detection

Y. Wang, Z. Li, T. Wu, I. Duncan, Q. Lyu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Due to the development of E-commerce, phishing attacks are one of the major current cyber threats. Phishing attacks have become increasingly sophisticated and have exploited both individuals and organizations. For the enterprise, a successful duplicate phishing website may affect an organizations reputation or be the basis of a subdomain takeover attack. This latter attack can completely escape the detection of an SSL certificate and have a direct impact on the enterprise. A successful subdomain takeover attack has a higher threat level as a controllable subdomain owns the same SSL certificate with its parent website, and yet it does not require an advanced technical skill to exploit. In this paper, two techniques have been presented as potential solutions. One is a query approach based on machine learning for querying existing subdomains and the second is an auto-detection system to identify the potentially risky subdomains.
Original languageEnglish
Title of host publication2021 international conference on cyber situational awareness, data analytics and assessment (CyberSA)
Place of PublicationPiscataway, NJ
PublisherIEEE Computer Society
Pages1-10
Number of pages10
ISBN (Electronic)9781665425292
ISBN (Print)9781665430920
DOIs
Publication statusPublished - 12 Jul 2021
Event2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2021) - Virtual conference
Duration: 14 Jun 202118 Jun 2021

Conference

Conference2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2021)
Abbreviated titleCyberSA 2021
Period14/06/2118/06/21

Keywords

  • Phishing
  • Subdomain enumeration tools
  • Subdomain takeover attack
  • Subdomain takeover detection

Fingerprint

Dive into the research topics of 'An empirical study: automated subdomain takeover threat detection'. Together they form a unique fingerprint.

Cite this