domainregistration services can't say there is no service to alarm them for phishing domains

The service computes a registration risk score for a proposed domain, which gives a measure of the likelihood that this candidate domain may be used to host a phishing attack. We do this by using the results of two algorithms:

 

  • The first algorithm, Phish target score compares the candidate domain to each of the frequently-phished legitimate domains we have on record. This comparison is done on a per-character basis, and the score is formed by looking at the minimum set of edits required to map from one to the other. The algorithm recognises certain tricks commonly used in domain names to deceive victims, such as double letters (paaypal.com) or confusing characters or combinations of characters (paypa1.com). We also check against a list of deceptive prefixes and suffixes that are frequently used by phishing sites, including signin and verify. As well as using a set of fixed rules, this algorithm also retains the flexibility to match new mappings and edits that have not been seen before. Using the suggested cut-off of a minimum score of 5/10, this method identifies 278 (12.7%) out of the 2,191 phishing domains currently blocked by Netcraft.
  • The second algorithm, String entropy score, works entirely differently. Many phishing domains in our database are essentially random strings of alphanumeric digits, yet very few legitimate sites follow this pattern. The string entropy test looks to see if a domain looks like a combination of real dictionary words and plausible names, or whether it looks more like a randomised string. The higher the score, the more random a string appears to be. Although most dictionary strings score zero, the suggested cut-off is a minimum score of 5/10; any domain scoring higher than this is very likely to be random, but below this score false positives are increasingly likely. Using the suggested cut-off identifies 474 (21.6%) of the 2,191 identified phishing domains and these are substantially non-overlapping with those domains spotted by the first method

http://www.netcraft.com/anti-phishing/domain-registration-risk/

They always say 'Me, I know nothing, I do nothing' but this is not true

off course you could use common sense and block already for example 100 words that shouldn't be used in any domainname because they will always create not only confusion but also a financial risk (a site like mypaypal.biz is a phishingsite for paypal without any question)

but as a business they would like to have some formal objective reason not hold a domainregistration and this (not free) checking service by netcraft is only one of the different services that will help them to do this

off course it should be necessary for all the domainregistration services (also the thousand new ones) to use this service at least for the financial services and social media

The comments are closed.