How is Computer Vision used to detect phishing attacks?
The rise of artificial intelligence platforms such as ChatGPT has seen the technology introduced into the wider community. Whether you love it, hate it or fear it, AI is here to stay. But AI doesn't just represent an intelligent chatbot. It is being used in many creative ways.
One such way is to use AI-powered Computer Vision as a layer of cybersecurity. Let's see how CV helps against phishing attacks through the following article!
How to use computer vision to detect phishing attacks
Phishing attacks are one of the biggest cybersecurity tactics used by scammers. Traditional methods of detecting them are imperfect, while threats are becoming increasingly sophisticated. CV aims to block one of the known vulnerabilities - it's reliance on the blacklist of 'traditional' methods.
The problem here is that updating the blacklist is not a simple matter. Even a few hours from the time a phishing site is launched until it is blacklisted is long enough to do a lot of damage.
CV does not depend on blacklist, nor does it detect embedded malicious code. Instead, it uses several techniques to flag suspicious entries.
- Images collected from relevant emails, websites or other sources may contain threats. They are then processed using computer vision.
- The image processing stage examines 4 main factors: Logo/brand detection, object/scene detection, text detection, and visual search.
- These are checked using a process called 'Risk Factor Aggregation' and as a result suspicious items are flagged.
Let's take a closer look at how CV finds clues in the elements it examines.
Detect logo/trademark
Brand spoofing is a common technique used by scammers. Computer Vision is programmed to detect logos commonly used by scammers, but it can also combine this information with the content and priority of the email.
For example, an email marked as urgent with a bank logo could be flagged as potentially fraudulent. It can also check the authenticity of the logo against the expected results from the CV data store.
Object detection
Scammers will often convert objects like buttons or forms into graphics. This is done using a variety of graphical and coding techniques designed to make things complicated. Additionally, encrypted scripts can be used to perform actions like creating forms, but only after the email or web page has been rendered.
Object detection looks for visual clues after a web page or email is displayed. It can detect objects like buttons or forms even in graphic format. Also, since it checks after the email or web page renders, encrypted elements are checked.
Text detection
Similarly, text can be disguised using a variety of techniques. The preferred tactics used by scammers are:
- Random letter padding is removed when the page or email is rendered.
- Disguise words by misspelled words. A common example is Login , which can be easily disguised by turning the L into a capital I - Iogin .
- Convert text to graphics.
CVs can use text analysis to detect trigger words such as passwords, account details, and logins. Again, because it runs after rendering, all text can be captured and scanned.
Visual search
Although this is part of the anti-phishing CV toolkit, it relies on reference data to work. This leaves it with an Achilles heel like any other blacklist-based system.
It works by keeping a 'template' of KGIs and KBIs in the database. This information can then be used to make comparisons to detect anomalies.
Is Computer Vision a stand-alone anti-phishing system?
The short answer is no. Currently, CV acts as an extra layer of security and is only a viable option for commercial businesses.
However, for these businesses, CV adds a new layer of security that can scan objects in real time without relying on blacklists or detecting encrypted threats. And in the ongoing race between scammers and security experts, this could be a good thing.
Looking ahead, the sudden and rapid proliferation of AI-powered chatbots like ChatGPT shows how unpredictable it can be when discussing any form of AI. But give it a try anyway!
What is the future of Computer Vision as an anti-phishing weapon?
While it's unlikely to be as impactful as AI-powered chatbots, CV's anti-phishing feature has made steady progress.
Not too long ago, this technology was suitable for larger enterprises that had the network infrastructure and bandwidth to run it as a cloud-based solution or on-premises service.
But everything has changed.
More practical subscription services are now opening up to businesses of all sizes. What matters in the age of cloud computing is the ability to protect any device from any location. This is currently an option with many services.
However, if you're looking to add to your home computer, this isn't a realistic option yet. The exponential increase in complexity and availability of AI models will almost certainly bring this functionality to home users.
The only real question is when.
Recently, AI has been in the news a lot, the most prominent of which are platforms like ChatGPT, Bing Chat, and Google Bard. These are disruptive technologies that, over time, will radically change how we access information and what we can do with it.
While these are certainly attention-grabbing tools, less disruptive technologies like CV are quietly making waves in the background. And anything that helps disrupt the growing phishing attacks is a good thing.
You should read it
- [Infographic] The trend of Chatbot will explode in the future
- 10 ways to prevent computer vision syndrome
- 70 simple ways to help you be more creative at the office
- 7 simple ways to train creative thinking skills
- 10 tools to help you promote your creative ability effectively
- Android or iOS better? Bard answers a question that causes fever for Google engineers
- 25+ clever creative children startle everyone
- 8 key factors to consider when testing AI chatbot accuracy
May be interested
- India's largest IT services company is hit by a hacker 'the giant in the field of providing it services in the world's second most populous country, wipro ltd, based in bengaluru, karnataka, india, has become the latest name and also the most lucrative. join the list of businesses that are victims of phishing attacks in 2019.
- Watch out for phishing attacks that can steal Apple ID passwords very hard to detectfelix krause, the ios developer and founder of fastlane.tools, describes a nearly undetectable phishing attack, explaining how ios apps poisoned to steal apple id passwords to access icloud accounts and personal data.
- The 4 most popular network attacks towards older people in 2018a statistic has shown that in recent years, cyber attacks tend to focus more on older users.
- Excel continues to be used as a lure for online fraud with complex mechanismsthe popular tools and software used by microsoft have become the target of hackers to deploy online attacks many times.
- Learn about the Adversary-in-the-Middle phishing attack methodphishing attacks are extremely common right now. this method of cybercriminals can be very effective in stealing data and does not require a large amount of work at the grassroots level.
- 3 types of dangerous cyber attacks in 2021ransomware, phishing messages, and phishing emails will be the types of attacks that will be faced by small and medium businesses (smes) this year.
- 25% of 'over-the-counter' phishing emails are the default security of Office 365a recent report showed that as many as 25% of all phishing emails were found after researchers conducted a series of 55 million emails that had previously been office 365 exchange online. protection (eop) - office 365's default security program is marked as' clean 'and of course has been reached by users' inboxes, while another 5.3% is whitelisted. instead of being blocked by administrators.
- Even mobile sensors can become phishing attacksthe complexity and sophistication of cyberattacks are always in line with the development of the internet world.
- How to block phishing attacks in Firefox 3phishing evolved from the previous phreaking, a form of attack on long-distance telephone systems for free calls. however in phishing, the level of influence is many times greater.
- Air New Zealand hacked, customer information is at risk of falling into the hands of hackersair new zealand - one of new zealand's largest airlines, has been visited by hackers