Phishing attacks are a serious threat to individuals and organizations, but they can be combated with a combination of techniques. Rule-based detection can identify known phishing URLs, while URL-based techniques can detect previously unknown URLs. Content-based techniques can analyze website content for potential phishing attacks, and host-based techniques can monitor system behavior. By combining these techniques and utilizing AI and ML, a high rate of detection can be achieved to protect against phishing attacks. In addition, our approach to building a phishing URL detection system also incorporates microservice architecture and cloud technology to enhance its performance. By leveraging the scalability and flexibility of cloud infrastructure and deploying the system as a set of loosely coupled microservices, we can achieve faster and more efficient processing of data. This allows us to handle large volumes of requests and data, and effectively utilize AI and ML techniques to achieve a high level of accuracy in detecting phishing URLs.
- ✨2 ML Models✨
- ✨Microservice + Kubernetes + Scale containers✨
- ✨Kafka - Big data✨
- ✨Fast API + GUI Flask python✨
- System performance: ~1-2s/URL, >1000 requests/s
- Link web-based application: Detect Phishing URLs
- Presentation: Detecting Phishing URLs Presentation
- Real-time Extension-based application to warning phishing URLs for users
- Expand the system to other platforms
- Improve the speed of classifying URLs
- Increase the number of requests per seconds
- Apply some takedown methods to prevent URLs from being widely spreaded
- Web-based application
- Import a .json, .csv, .txt file list of URLs to classify URLs into 2 groups: Phishing and Legitimate
- Enter one URL to see the result
- Dashboard to see the statistic of the result
- Take actions with the URL entered: proceed, block or (report, send email - in future)
- Extension-based application
- Browser extension
- Give out information of the URL before users proceed to it
Not enough as [MSEC team] [df1]'s expectation but a foundation and motivation for us to continue to develop and maintain applications.
MSEC team
"Trying our best for a clean CyberSpace"
Spreading not only our knowledge but our enthusiasm for Security field <1
Test
cd dillinger
docker build -t <youruser>/dillinger:${package.json.version} .
This will create the dillinger image and pull in the necessary dependencies.
docker run -d -p 8000:8080 --restart=always --cap-add=SYS_ADMIN --name=dillinger <youruser>/dillinger:${package.json.version}
Note:
127.0.0.1:8000
Happy hacking, guys!