Professional Documents
Culture Documents
SA
1
אدא
و
Wאوאאאאد 2
3
אدא
و
Wאوאאאאد
ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ
د"#$%&'Kنא (
م"#Kن&01א-.-/א *+,
2.&3
دKز.د"1$%نא 435
و
אدونאوא
د
אدא
و
Wאوאאאאد 4
=<Lא)6אع 1429L5884W
=د 978-603-00-1453-8W
>;=83قא *789:;0
א*/0אو?
2009-@A1429م
5
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 6
ا
س
ﻣﻘﺪﻣﺔ 9.....................................................................................................
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ :ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ 14...........................................................
1.1ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ 15.................................................................
1.1.1ﻋﻤﻴﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ )15 ................................... (E-Mail Client
2.1.1ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ )16 ..................................... (E-Mail Server
2.1ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺒﲏ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ 17.....................................................
3.1ﺑﺮﻭﺗﻮﻛﻮﻻﺕ ﺗﺮﺍﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ 18..........................................................
1.3.1ﺑﺮﻭﺗﻮﻛﻮﻝ ﻧﻘﻞ ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ 18 ...............................................
2.3.1ﺑﺮﺗﻮﻛﻮﻝ ﻣﻜﺘﺐ ﺍﻟﱪﻳﺪ 18 ......................................................
4.1ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ 19.....................................
5.1ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ 21...........................................................................
6.1ﻫﻴﻜﻠﻴﺔ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ 22..................................................................
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﱐ :ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ )24................................ (Spam
1.2ﻣﻘﺪﻣﺔ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ 26..............................................
2.2ﺃﺳﺎﻟﻴﺐ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ 31.............................................
1.2.2ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ :ﺑﺮﻳﺪ ﺍﻧﺘﺤﺎﻝ ﺍﻟﺸﺨﺼﻴﺔ )31 ................... (E-Mail Spoofing
2.2.2ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ :ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻔﺘﻮﺡ )31 ............ (Open Mail Rely
32 ﺍﻟﺼﻮﺭ)(Image-based Spam 3.2.2ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ :ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ﺍﳌﻌﺘﻤﺪﺓ ﻋﻠﻰ
4.2.2ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ :ﻫﺠﻤﺔ ﺍﻟﻘﺎﻣﻮﺱ )34 ........................ (Dictionary Attack
3.2ﺍﻻﺟﺮﺍﺀﺍﺕ ﺍﳌﻀﺎﺩﺓ ﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ 34...................................
1.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ :ﺍﻟﺘﺼﻔﻴﺔ )34 ................................... (Filtration
2.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ :ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﻭﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺴﻮﺩﺍﺀ )35(Black lists / White lists
7
אدא
و
Wאوאאאאد
3.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟﺚ :ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﺍﻟﺘﺠﺎﺭﻳﺔ )37 ...... (Commercial Whitelists
4.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ :ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺍﻟﺘﻜﺎﻣﻠﻴﺔ )37 ................ (Integrity Check
5.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ :ﲢﻮﻳﺮ ﺍﻟﻌﻨﻮﺍﻥ38 ........................................
6.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺩﺱ :ﻋﺪﻡ ﺍﻟﺮﺩ ﻋﻠﻰ ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ38 ..................
7.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ :ﺍﻹﺑﻼﻍ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ )39 . (Spam Reportin
8.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ :ﺍﻟﺘﻘﻴﺪ ﺑﻮﺛﻴﻘﺔ ﻃﻠﺐ ﺍﻟﺘﻌﻠﻴﻘﺎﺕ ﻟﱪﺗﻮﻛﻮﻝ ﻧﻘﻞ ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ
)41 ...................................................................(SMTP RFC
9.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ :ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺰﻳﻔﺔ )41 .... (Fake MX Records
10.3.2ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﻌﺎﺷﺮ :ﺗﺄﺧﲑ ﺍﻟﺘﺮﺣﻴﺐ )43 ..................... (Greeting delay
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ :ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ )45............................................... (Phishing
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ :ﺃﺳﺎﻟﻴﺐ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ )65...................... (Phishing Techniques
1.4ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ :ﺗﺴﻤﻴﻢ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ )67 ................. (DNS Poisoning
2.4ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ :ﺗﺴﻤﻴﻢ ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ )70 ............ (Hosts File Poisoning
ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ :ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺑﻮﺍﺳﻄﺔ ﺣﻘﻦ ﺍﶈﺘﻮﻯ )71(Content Injection 3.4
73 . ﺍﻟﻮﺳﻂ)(Man-in-the-Middle Attack – MITM ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ :ﻫﺠﻤﺔ ﺍﻟﺮﺟﻞ ﰲ 4.4
אدא
و
Wאوאאאאد 8
1.1.5ﺇﻧﺸﺎﺀ ﺣﺴﺎﺏ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻠﺒﻼﻏﺎﺕ 92 ........................................
2.1.5ﻣﺮﺍﻗﺒﺔ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪﺓ )92 ...................... (Bounced E-Mails
3.1.5ﻣﺮﺍﻗﺒﺔ ﻣﺮﺍﻛﺰ ﺧﺪﻣﺔ ﺍﻟﻌﻤﻼﺀ 93 ..................................................
4.1.5ﻣﺮﺍﻗﺒﺔ ﺣﺴﺎﺑﺎﺕ ﺍﻟﻌﻤﻼﺀ 94 ......................................................
5.1.5ﻣﺮﺍﻗﺒﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺼﻮﺭ ﺍﶈﺘﻮﻳﺔ ﻟﺸﻌﺎﺭ ﺃﻭ ﺭﻣﺰ ﺍﳌﻨﻈﻤﺔ 94 ............................
2.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ :ﺍﻟﺘﺼﻔﻴﺔ )98 ..................................... (Filteration
3.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟﺚ :ﺍﻟﺘﺤـﺪﻳﺜﺎﺕ ﺍﻷﻣﻨﻴﺔ ) (Security Patchesﻭ ﺟـﺪﺭﺍﻥ ﺍﳊﻤﺎﻳـﺔ
)99 ...................................................................... (Firewalls
4.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ :ﺗﺼﻔﻴﺔ ﺍﻷﻛﻮﺍﺩ ﺍﻟﱪﳎﻴﺔ ﺍﳋﺒﻴﺜﺔ )100 ..(Cross-Site Script - XSS
5.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ :ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ )101 ............... (Visual Keyboard
6.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺩﺱ :ﺍﻟﺘﺼﺪﻳﻖ ﺍﻟﺜﻨﺎﺋﻲ )102 ......... (Two-Factor Authentication
7.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ :ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ )104 .............. (Mutual Authentication
(Anti-Phishing8.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ :ﺃﺷﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ
)105 ..................................................................... Toolbars
9.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ :ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ )110(Anti-Phishing Software
ﻣﻌﺠﻢ ﺍﳌﻔﺮﺩﺍﺕ 111.....................................................................................
ﺍﳌﺮﺍﺟﻊ 117................................................................................................
9
אدא
و
Wאوאאאאد
אدא
و
Wאوאאאאد 10
?xIن?/b4א)&'&/L73Lwא7`47و&7F7bא 7Bنوא^7א YO
BOא/7"(76د?za،ن?y37#א^7אمא)&'&/7?w7אً- 7Zm7I7$
و(7gא/7rאدKو?ً 736/Ly37#א7مא7(6Jx7نm7rא^7אمא)&'&ً 7Bw7
- Zوא/rאد7g7
x]Iא 74لKو
7
7نd7OאM+= 7Vא`/7ون
א Bً 33nא6א`/א I#و "Lعא"/ق{r،نBOא6א^אمא)&'&ً 33y3#?w
Bא/L6א8?_p YI#א<Yrو? ،<Y3و 33Z6ن K= " ?m
وx8אא( I6Hول?Sא " =א@6و%78א "7#$دא)('و&%7אJx7
F
M03Z6Lא -א^bא= Lمא- Zi6/Zא،(I3و
7`r Y40O'6אنא7אل7O7א@K- 7Zو/7Z6ضx78אא(7OH 7
א((7&?/Y7W?ً I3،/Zאعא0 7א 7Y36t7א 7oن "7#pد،
وً inא)
/א.א-אO6 LZאK- VCو} Lو ~rא] نMא = 7
nعא( Km8H
وaذ?&/haU7743O 77(/(77 f77א\77i 77Yאx778M%77/אא 77ل
א@ 77Zس?U77I
?&{77r،نx778<Y77Z6אא(%^77Z774OMH 77א)&'&77w77
א " =و K 8= h`O
אدא
و
Wאوאאאאد
?Ui77nא776א)('و&77(E-Mail)%77و 77א 77bO$لא@776وא +x77
אدא
و
Wאوאאאאد 12
= &$א"/د/dو=א 6م،א\ZU4.א/rאد?وא<7c%]rK- cI
-$ kא 4لSא6א)('و&%א
EFaxF Iدא+א bOل? K
א6א)('و&m]b%و/OאJ?7m77و/O7א،\/7 ?7
א'(aw&
.و&?مLm&{r،$א6/4.%( Cpא^7א Y
8א_gא8א_א א c& Y4}tمא6א)('و& K%
x8L I6אא( FHא 0אM^Zאpلא6א)('و&%
(،.%وא)
/א.א-א ,د C+؛و<7Z`OLא(7br7ZzaH 7لK
א]bאول c&/6مא76א)('و&،%7وא]7bא 7=L 7I6%& 7א76
א)('و&g77%77א،ESpamF77/و}77n77`776عא(H 77אN/77و778
א "#$دא)('و&EPhishingF%7وא(7Jx7ن7nعא]7bل7א zav7
א KN
3Oو?x88אא( m&
MHد 64O+א%^7Z7Y
/
א@ 0وא(3א EInternetFא76xא'א747א76א)('و&7S?%7
?&<Y"77א77M77א`I77א@ 77د\77iא 77kM%77/ل<77Yو 77ZSس
Vل?א K-
13
אدא
و
Wאوאאאאد
אدא
و
Wאوאאאאد 14
ا اول
"#م ا
ا
و
• ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ
• ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻌﺘﻤﺪ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ
• ﺑﺮﺗﻮﻛﻮﻻﺕ ﺗﺮﺍﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ
• ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ
• ﻫﻴﻜﻠﻴﺔ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ
15
אوאאאאدW
אدא
و
KEE-Mail ServerF%&א)('و6א
(E-Mail Client) ﻋﻤﻴﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ1.1.1
m7Y
אא78و،EMail User Agent-MUA)^م7Zא76/7
ًو7,6?UZ6
KEE-Mail ServerF %&א)('و6و دمא،^مZאI3א
W%8%&א)('و6א4F و
^אم7 EE-Mail ServerF دم7אM76אH 7ZS776'
عא7•א
KEPOP3F6א0(
لOو/
K= ل+א- `אzaً دאI א/א3n•
76
ل&`אO/ ^אمEE-Mail ServerFא دمza /<אZO•
KESMTPFZ3א
K%&א)('و6 مאc&M%&א)('و6א4dLE1-1F(אyn6
אوאאאאدW
אدא
و 16
Microsoft ?q 777&/%777&א)('و7776א7774qא/777U7774777א777
.?wrو/(6 ?
/WE1F?Outlook
אدא
و
Wאوאאאאد
אوאאאאدW
אدא
و 18
אدא
و
Wאوאאאאد
אوאאאאدW
אدא
و 20
K?abc.com?8?xyz@abc.com?J6אنאI" قIًא<אpr
- 7&(א7S?78EDomain Name System - DNSF- 7L "Iא. 7? م7c&
( ﺍﻻﺳﺘﻌﻼﻡ ﻣﻦ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ4-1) ﺷﻜﻞ
مp7$א%78- 7L "Iא. 7? م7c& Y7`6t7\א/ א- \אSa
/7
?E 7I8ن7(67`rK" <&" ق3O/א%&א)('و6 אدمא. ?4
21
אوאאאאدW
אدא
و
.E– MX records
ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ5.1
(Mail exchange records – MX records)
< 7Z א76وB7وذ، 7/ لא7b6a7]
/ دلא3O-pVد
preference F دم7 (%,]O<L=d3`Z}%&א)('و6 אدمא.
KEnumber
אدא
و
Wאوאאאאد 22
אوאאאאدW
אدא
و
/} %&א)('و6אH ZS<אWsender
. /אmI-=#Jx" ق^ دمאIא<אWsource domain name
ً 7&אI4J7?ن7(وK3`7Z} J76אنא7Iא:EToF3`Z אJ
777bאU77743`777Z אنא777I4ن777(6K3`777Z} 7774k?و،ًא777Sًوp3`777Z}
K[receiver]@ [destination domain name]
3`Z} %&א)('و6אH ZS<אWreceiver
.ma /} =دאJx" ق^ دمאIא<אWdestination domain name
%7&א)('و76 دمא7 7 7/ =אZ%b]O نWERouteF= Z אJ
،\/77 "א77 אدمא77ًو=א/77،3`77Z א%77&א)('و776 دمא77 za7
/ א
74qא/7ض/7O$+ د74.U74אza]7אBאZZא0ZS3O/
Y7n/4^م7Z نא7({7(،76אd7ً+/W 3= Zא- & %&א)('و6א
= 77Ya?= 77^
،%7 &א)('و776א774qא/77M+/r77- =א77 776/774
ً$ 77ض/776E7-1F(77وאK?77
?%77&א)('و776א774M?77#א
K= Z
K /عאn:(Subject) • ﺍﳌﻮﺿﻮﻉ
K /&א:(Body) ﺺ• ﺍﻟﻨ
%&('وa6/ =E6-1F(W
אدא
و
Wאوאאאאد 24
ﺷﻜﻞ ) (7-1ﻣﺴﺎﺭ ﺭﺳﺎﻟﺔ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ
ﺍﻟﺸﻜﻞ ) .(7-1ﺑﻴﺎﻧﺎﺕ ﺍﳌﺴﺎﺭ ﰲ ﺭﺳﺎﻟﺔ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ .
ا"! ا
ر) ا ا('&و
$ا#$
)(Spam
25
אدא
و
Wאوאאאאد
אوאאאאدW
אدא
و 26
7Y]6/Ov7S77/אg7%&א)('و6= אb]אאx8L I6
K- cIאدوא/r\אZU4=א/n?m33ZO و، Yrא8?و
7776 لא777=aM^777Zא0 777א777b]אאx7778L 777I6777ذ777و
K C+ د,א-א.א/
)وא،H/אg%&א)('و
ﻣﻘﺪﻣﺔ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ1.2
(Spam)
م77c&^אم77א+. 77a 77Y&77/אg77%77&א)('و7 6 א77=_/77O
7EBulkF7 8<7
ل7={EElectronic Messaging SystemF7& א)('و/א
fx77C3`77Z א773L7777/?وא77L?وא77"אg77אو77 א77/א
Electronic F%77&א)('و776 مא77cIESpamF77
ط773O= عא77W77`وK 77/א
777/777وJ?U7774ً 7 7,6?7773"IO 777Y&a$a،EE-MailFً =א777b ?وא،EMail
W&א)('و
KEBlogsF- &•אو
KESMSF+gb`אbI א/•א
KEForumsF- 6I•א
KEWeb Search EnginesFvi3א-
/•
KEInstant MessagingF/W 3א'אאL%&•א'אא
7Cp 7و،J= 7Vنאp74)א8 /אfx8ض/(نא6 ً 3
F 7(אمא7&$ًא/7c&،+78ز7](Oو/7Z}ون76/6 74نp74ن7IאV6
7&p4)א+ د7אB7Y¤\7 אU4 rK- &p4)אfxY+ د4"3O/אא
27
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 28
7742 ESymantecF?& 77?W
/77WmO=77#?1 J/Y77W/776/`O/77Y?
76א37Z&?ن2007 م747/76אr/Y77/אg%&א)('و6= א
MوK%7 &א)('و776 א77=% 77§a77٪6977H77/אg77%77&א)('و
377ZIאfx778?ن/77Y?4 ECommtouchF?77Oم77
?
/77WmO=77#?/77 3 /776/`O
7 7== 7140J? ٪87w72006 م74Mو٪67w72005 م
K2005 م44٪30 8=L+ د6B، == 160% §a
3777ZI 3rK- 777cIאدوא/777rª ج7774زa=777b777 א3777ZIאfx7778(777O
07& XאU7rK 7/אfx78 Yh7iO}?ن7(7I?و7 = " ?E I8- cI
W% א
K]א3L Y]bO و/אאx8+.א/` ,אא- 4 •
773L77 77YO.א/L77@ 77/אאx778«77]@ 77,א77I6B^אS 77Z•א
KEFאF3`Z א
E-Mail F%7&א)('و76 دمא7 U74J=و/7,אgETrafficFr•א
KcIEServer
Data Network F ل777bO$א+ 777IL777ZJ=و/777,אg777EpY777$•א
(1) The State of Spam, A Monthly Report – February 2007, Generated by Symantec
Messaging and Web Security
(http://www.symantec.com/avcenter/reference/Symantec_Spam_
Report_-_February_2007.pdf)
ESymantec.comF- ?א- `3"O لkMbb^
/W%8 E2F
(3) 2006 Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch® Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_
Trends_Year_of_the_Zombies.pdf)
%&א)('و6- ?א- k/Mbb^
/W%8E4F
Ehttp://www.commtouch.comF
29
אوאאאאدW
אدא
و
(1) 2006 Spam Trends Report: Year of the Zombies, December 27, 2006, Commtouch®
Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_Year_of_
the_Zombies.pdf)
%&א)('و6- ?א- k/Mbb^
/W%8E2F
KEhttp://www.commtouch.comF
. ن1000O دE3F
m?w?7אKEbitFw8(نOوH @אM- א6Bl سL+Sو%8EbyteF w6 E4F
K?0???و1? a نL
. ن1O دE5F
. Ehttp://www.spamlaws.com/state/ca.shtmlF- bb^ لوא4ª &=]
=دE6F
אوאאאאدW
אدא
و 30
Jد7O7Lt7وא، 7/ I,(א א3=وאא6/4?و،&א)('و
+دود777`6/"אfx7778U7774ً$ 777وKm777وس?وg777rF777x777]IOza 8=و777
y77r776/74+ود77אfx778-/7&אK2004/6 77I6Mw]77
אt7א،?MyDoom?
F7نא7 7/א3`7Z مא7Y6{7وذ،%7&('وa76/ 7=d77r/אF7א
אx7C3`7Zאy7r7I4و،?MyDoom?+دود8``@אMو/]%b&Fr/א
ل7={ 7#)א/7h?7م7`r،+ود7אfx7Yً by3b6f زY
{نrr/אFא
K1 i, زאY
M]\/ ?&('وa6/6 وI4za /^אZ&
س77I /76/א77
?7 7Yr77/אg7 7/^אمא77<א76<א/7
•
? 76gV&M7'و3א- =א7$ ?א7/
ل7S$ א7=%8و،]_א8
K 7`6/r?H7I
76=Y§M%& 7&אJ/7א7`ً 7,6?وאK 8/
ذZא
¬7 O766א6 و7Iא77 8<7( 7=ن7/א7=? I4b`אfx8?3O
7876אאx7Cא7א3`7Z א7 ن7
و،2 7&א/א7_$א- PQ
78و،76 m7IH7"אx7]&وx(אm4w"&אJxوא،6 &א. 6/hאS?
م7Lm7#و7I4و، 7`6/r?H7I
6=Y§_ 6=?SאندI4za08x6?ن
76]אא7Z6 7و،mSא/7قp7)m78?76]א3 وmr " ن/א
K3 H/אg6אאxC،min( نr،fL
אدא
و
Wאوאאאאد
אوאאאאدW
אدא
و 32
O (א3א6 د4אً`א/c&%&א)('و6 ل= אb6a ن, א
دم7® ل7bO$אU74= د7Lg7 7/אm7I-=7#Jx7 دمא7 نא7
{ذאr، م6א
دم77 770776/L77]/77 دم77 za C 77b6am77& ({77LאU774m77&{r3`77Z א
K/7 w7LوM / لאb6aM]^ دمא,r?#/rE I8(نr،3`Z א
g7 7/א%7
/} 73L7 Cp7אI?+/hw(Wא'אMאfx8
7S]אدم7 ن7(O76@אدمא7א7ًp7Lًدא74{ن7rx7ًא/c&؛و/א
E 7I8ن7S]אدمא7א77 א` د7/א3`6$6@אאدمא6وא
./g /אfx8(نO ًن6Lً$ Sא
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 34
4.2.2ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ :ﻫﺠﻤﺔﺍﻟﻘﺎﻣﻮﺱ )(Dictionary Attack
7אg77776אH77/א` 77س 77I477lMو776/6
^77Z677Lم } /
'(aو&،وذ. 7?r 7na76/747ذא+=Y7- 7L "&. 7U7I-؛
وfxYא"(6`6/ن I4و'(a6/6و& K
א .א 4VIد(O +ن Lس. 7و?`K+=Y7H 7وU7S
aن
&<cwא .א
gVIدM+אא?$adLنאYدiZ6אx3لM
lو4دLא Iو6א 7Zza/cI 7iibא" 7°aM7`6/دfx78
א Iو K6
و )( نאU74_/7א 7Iو6א74k7"7Iא 7Iو6א77VI
א` س
،نא/7دU74א?، 7/وd73Oא/7אא7&M7,א%7"6 7/
7=a7I4m^7Z67ل
?U4ن6/א 7° ،7&3`Zא /
د /} $
א6Bא K/g /
אوאאאאدW
אدא
و
KESubjectF /عאn•
KEBodyF /•&א
77r² /± <א7`\א7Sad7 دم7`א76 א7b \7Saw` "O{ذאr
=?س77Z6'و377ZI +د77<77L?و،7 &('وa776/6 و77I
77Y&?U774]77bא
{ن77rI7ع?وא77n377ZI Eregular expressionsF77r-אg377O ?و77/א
Kאא=د6אאx8א=אًن/Lx^6א دم
7YI(،7/אg7 7/J7b7`3"א-א.א/
)א/
?%8]bא
77# ،]7bא74 7Y4+7א&א7`- وزא7Vא6n/4
&א77LM6g377 `و77L(&ند6 77+ د7746x77א77/אg77 77/א%77/
K1 ]bא
Black lists ) ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﻭﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺴﻮﺩﺍﺀ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ2.3.2
(/ White lists
- 77L "&. 77??و،7 &('وa776/6 و77I4U774.دא77Zא77 `אJ77
7776/אدم77EIP addressesFw777&'&$لא777
Oو/6 و777I4?وEDomain NamesF
(1) M. Gupta, C. Shue, "Spoofing and Countermeasures", Book chapter in "Phishing and
Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft",
edited by Jakobsson and Myers, 2006, Wiley.
אوאאאאدW
אدא
و 36
7/]א7b3`7Z}37ZI %7&א)('و76 دمא7 אد4a )( ن
]I7b א7/אr/fאد4a(ً ,6?و،.دאZא`א<אU4 د4$ א` د
Junk F77+ د74_/63`Z אH ZSM ص kz אY`&?و.دאZא` א
/א. `{ a3`Z} @אfx8M=א/`אE/OوESpamF?وEBulkF?وEE-Mail
K YrxS?و
776 rK.دא77Zא<א77`א77ً 7
N77(אU774%77Yr. 77,3א<א77` א77?
\77Saw77` "Oذאa=و/ 77m77y 7 Z6}،.دא77Zא77 ` א77نaوU77S، دم77`א
77
نא7,7وذ،7LאU74. 7,3א7 `א/7# I47S?dmb b
m]IbOنaوUS،3`Z א6/H ZSzaY_א/?א` دم6لא#و
%78. 7,3א<א7`^אمא77$\/7 ?7`6/E 7I8وK.دא77Zא7 `א7n7
M+د7oאدمא7?وא- 7L "I?وא6 و7Iא77א` د76 א7/`r Zא
. 7,3א7 `א7n7FI7bO t7 א7/ذאgو،. ,3א` א
7`6/M 7
،^م7Z אH 7ZSM ص7א7אza C 7b6a ?وY7,r=<76m&{r
K.دאZ] ^אمא`א<אbא
]Ib א/_אxS J`^ دم-אدא4{ وJא دم/6{( ن
U774ًא. 7I3`77Z אH 7ZSM ص7 77kza Y7`&?و.دא7Zא77 `א7ً 7 °a
. 7Iو،.دא7Zא7 `وطא/73ZI + אא=د/<א±²̀ O}vSEscoringF<`א
7
=دw&
ذאa+ د4وK Y`& ?و/_אx³=א/`א دمאx^6<`د=
אU4
?وY7,r=<76m7&{r، 7/אU74w7`3"&אLوط/<אcنaJ?، 4<`א
7ًp7Lًدא74?نJ?،7&} <7`א7
=دw&
{ذאrKN( N(وאK YrxS
K3`Z אH ZSMאא صza Y`&<6m&{r، /אU43"&אLوط/א
37
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 38
=?س7Z6و/O76/4 (`אi /אir )( ن
d77EFromF?77?777א77`SM=
x77א77
/ אنא77I477&= `و،EHeaderF 77/א
M4 77ZO77`6/"אfx778KEReceivedF??وא=د77`@אM7 Z6و/OM+د77
א77`א
K1 /אg /א
_א
ﲢﻮﻳﺮ ﺍﻟﻌﻨﻮﺍﻥ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ5.3.2
(377א- i]77#Mw77&
.א77،7 אd77LאאMJ776אنא77Iא77
qא7777n/4 Y77° 778g?و، ش77`Iא- 774k?و،77h دo_א/77?و،77 א
g77776 لא77=aM^م77ZOt77א%77&א)('و776א6 و77I77אd77Vא
77 7Y§J د7]%7&א)('و6אنאI4/6.א/
a/YאxCوKH/א
K אdLאאMJ6אm&אI4 (^א/"nذאאaqאאfx8
77(?@?وאB/ 7 ?at?W7(אلא377א.א/7
)אfx78U747א7
،?xyz at abc dot com?/67iא7y37bO?xyz@abc.com? ل7?K?"`I ،?dot?
_/7א7%7א%7&א)('و76א6 و7I4d¤qא/d"ZO$`6/"אfxYو
KאنI لאb6אMض/א-?دL(نO Y&{r ` ،m4
Mً 7b&ًאB7=%&א)('و6אنאI4
.א/
)אfxC\/ אא
KאنIאU4_/אאdVאqא/U4=x6% و،+=#F
אدא
و
Wאوאאאאد
د?U747$نא/7د 7Lدم
fx8א IوK6א/دU4אg /א%"6/א /
I4אن&و K/g\/ ?3`Z =MmZr،%``S
N]Iא"{r`6/نאg /א=U4J/א)زא7I4אن
) =a_ `6لא /א3`Zא 7L،\/7
א 3`Zא` א /} 66
(6نא_Cא@``%و=אx8.אא/אa 68ذא
نI4אنא ً "&3`Z
?م K$
? =d `6/,rאg6א748/م 7Yirوא)p7غ
M\/I
، YI4א)
/א.א ,دא Kd Z
אوאאאאدW
אدא
و 40
7 6Jx7א%7&א)('و76غ }`م אpa8غp/ \ZE I8
U7 r=אز=א77S?77bl^77Zغאp77)قא/7777K3`77Z א776א0S 77#m77
- 7p دم7א7I4d7VO I4Kغp%&א)('و6א4M^مZ אY
وא
?و، 7/=א¹7b} دم7غאpa YI،# -א.א/
ax^6m&{rmZ]&6אU4+g
K\/ ? == لaًp3`Z(6pr،.دאZא` אM/ אنאI4dnو
7/} 76و،77Sza7 r7/אg /+ د,`א6/"אfx8
K/ א^אمא<&" ق% و،/ `مza&` ل$ אCp
776א77 773L7777אE1 J2F(77אM1 %& 773<א77/אy77n6
7773L دم777אza دم777`אH777/אg7777776א3777Z&،2 EGmailF%777&א)('و
،]7777777bא
ﻠﹶﻎ ﻋﻨﻪ( ﻧﺴﺒﺔ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺏ ﺍﻟﻘﺎﺩﻡ ﺇﱃ ﺍﳋﺎﺩﻡ ﻗﺒﻞ ﺍﻟﺘﺼﻔﻴﺔ ﻭﻧﺴﺒﺔ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺏ ﺍﳌﹸﺒ1-2) ﺷﻜﻞ
(gmail.com )ﺍﳌﺼﺪﺭ
(1) mail uses Google's innovative technology to keep spam out of your inbox”,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007.
. Egmail.comF (א3אU43%&('وa6/ `مE2)
41
אدא
و
Wאوאאאאد
אدא
و
Wאوאאאאد 42
א /ولא bO$ل?وdً$א دمذJא<L/אد&{r،UنyVI6 א bO$لm7
m&{r 03Zولdא دمאKm6Jx
4&E I8نא-pVZא 4$ ]6BدU4א<L/א] WVZ%,
• ﺳﺠﻞ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻷﺩﱏ ﺍﳌﺰﻳﻒ
)(Fake Lowest MX Record
7747אد
&/7cאً" 7=73א76א)('و&g7%7א /O} 7Y&
M7/
774{ 877د +و77א 77bO$ل® 77دمא776
،+g377و077?Mא 77Sن /}<77Y6$
א)('و& SM%لrא bO$ل`I6،نzaאIאنאJ6א K%
3OV,O\b6دل
/#?%,]O<L/F6BאM-pV7Z
א/77د 77 773L77دم?. 77א077U774- 77L "Iאp77$م77 774אدمא776
א)('و& "&<$%ق»( ± rلg /א K/
?0°ن 73OV7/W6دلא 7/אد&U7א7I4zaF76Bאن 7دم&7
x77CEPortאא 77دم` 77,ً 7نאp77مא 77/ 77(6v77³نא25F25<77L=x77]I
א4`r/אאدمא K\/
• ﺳﺠﻞ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻷﻋﻠﻰ ﺍﳌﺰﻳﻒ
)(Fake Highest MX Record
/}.J36Lאg /א /وא bO$لd7א 7دمذJא<L/7
א]%,אً$U4א دمذJא<L/א]%,אد& S$Uل
7
78g37ن
א دمذJא<L/א]%7,א U74دً 7א/7d7ً 7 Sא7ir (74 r7L?q
43
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (2-2ﻣﺜﺎﻝ ﻋﻠﻰ ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺰﻳﻔﺔ
אدא
و
Wאوאאאאد 44
0א bO$ل{rنU4±א 7دمא 7/א7@= 7c&$א 3`7ل= 7א'707S
א دمא =a3L3`Zلא6א)('و& Kma%
(א ]$د+'7r+אg7 7/J7bfx78/ 7א7
،7/ن
} 4 Y/د/cI6$+ون= א'/6،0Sن0+/W 3א bO$ل K
)( ن4aאدא 7دمfx78_ 7
$א"،7`6/وd7"L<7h7א 7bO$لd7
א دمא K/
45
אدא
و
Wאوאאאאد
אوאאאאدW
אدא
و 46
،m77rא8?و،m77]6/Ov77S77%77&" دא)('و77#$א77b]אאx778L 77I6
K- cIאدوא/r\אZU4m43O'א=א/nوא
77b^א- 77& 3אL/77WEPhishingF%77&" دא)('و77#$ א77=77O
،7b^ لא7i&ضא/7%7&א)('و76 א7=76/74 Z@وא6/Zא
i7, مא7Y6aو7I7cI?و،_= 7bא7S?7b^W ل7i&א6/4وذ
Km8?و0"א6Q
Y77
/}ن%77&('و$" دא77#$ א77= 77/א77ع77Iאאx778%77
77 78gو6/77Z مא7L=" دא7#$ً 7"
%7&א)('و776 א7=^ن7Z6
K (א3א%^Z/³\/ אZ@אb^א- & 3א
77={ن77r،ESpamF77/אg7777& א)('و77/אM ل77@א%778 77
- `3"Oza 8אO،7"`r%&א)('و6אU4/b`O$%&" دא)('و#$א
?و7& א7/وאESMSF+g7b`א7bI א7/
\/7 א'אא)('و&א
Mن7(6_p7 $א7(و،m7Z]&U7`36مY]
نא،EInstant MessagingF+/W 3א
/7
א%78%7&א)('و6(= אKmp /Xאx]IO<6Jxאא
K1 %&('و$" دא#$א- V8x]IOMً 4W
?ph?r/7@نא37Z6 + د74EHackersF7 (א37א%7L'
ن?وא
،7 (א37אI7#א/Ld7kJ?،<Y7kM+76
-
. &)?f?_/@
- I7ZOMEPhishingF7
-7&KF7l7 (א7(و،m7Z]&787"I
نא
KZ" دא#אOtאEfishingF(א6/نא/`א
ESpamF/אg66 א/ אY%&" دא)('و#$= א
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 48
P3O$m&?و،-]IאL3`Z}%b^אH Z@אzaא ل-$ و
=وB77d77Lא/77אאx778ن77(6و، 77/ د77
אא/77אMد77
ذجא77Iא
/77cI א77,6?v77S77%77#_א/77bאd77L<77bO 77"<77bESpoofedF
7P8ن7
،f= 7WوfB7=_و/7b<א7אd7nوو،ELook and FeelF س7ZS)وא
אوאאאאدW
אدא
و
K /אMو=
دBdLא( ^אم=אyibdL+= 6ز3`Z א
m74ض/7Oو،/7" M 7_/7bM3`7Z אH ZS?ن%4»O = J
K- p $אir (q &/MVZא
، 7Y3"3`Z `<א6 و،]6B#אM%8و،- 3+=O r = J
KF6Bא0"אאx8. ) /אMא
د/3`Z ودאB6و
M/77bאH 77Z@אU774d77Lg77g77Oل77b³F776B= 77Wa 77= J
Kgאאx8M/cIא/3`Z ودאB6و،3`Z}
U74ض/7Oو، 7_/7bM+76
7 - 7 ولB7&%4»O = J
KL+']ً & kאfx8U4لb@א#/rً Sًp4m&
،3`Z א
=وB7d7Lzam7
6 7/א3`7Z}{ن7r` 7Zא-$ @ אS
M
77b^W ل77i&אMً 7 `S$? دون77b ?אY^77Z6t77وא،6/77Zא- 77& 3אd77X
K\/ ? ?وa- 4Mi,א
W א-א"אM%&('و$" دא#$א- V8= b (א
K%&('و$" دא#$אVC"^ אJ1
KF6BאdLאBY¤ J2
77S?^אم77 ن77(O77Lو،77]6B א77/א7777 877
ل77=a J3
.ESpamF/אg /א0 ?
אدא
و
Wאوאאאאد 50
777א1 7 7אא- 777VC777Lא "777#$دא'($و& 777=%7 7א7776
א)('و&M
،%א(،E1-3Fאt7ز<7ZL?7 7Y&? Y7/}<74א 7ن?M
،? 3 ?_/bو?نא
$43`Zز 74?Wfא' ?7وو7nא
=א" ً `&pلi]#zaא' 7OوאJx7א?y7,Oنfx78אd7L%78i]7b
? 3 ?dL<b "F6BאS &%#א/7cIوא) 7ZSسlook and F
ﺷﻜﻞ ) (1-3ﺭﺳﺎﻟﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳌﻨﺘﺤﻠﺔ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"
אوאאאאدW
אدא
و
"( ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ2-3) ﺷﻜﻞ
אوאאאאدW
אدא
و 52
=وB7אdLאm و¼\א،%# א3 dL8E3-3F(א
K%#אdLوא
"( ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ3-3) ﺷﻜﻞ
d7L ً?نא7,6?«7Sp&وK? ض76/_?א/7bd7L8=وBdL/ ل
(7אM 7
_/7b%#אdL<" א#E4-3F(אM
=وBא
K سZS)وא/cIوא،Iوא،= אvSE5-3F
d7L ق7"I<א7وא،Eriyadbank.comFW78%#אdL" قIא<א
KEriyadonlin.net.msFF6Bא
53
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (4-3ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺍﻟﺮﻳﺎﺽ"
אدא
و
Wאوאאאאد 54
אدא
و
Wאوאאאאد
ﺷﻜﻞ 6-3ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﺏ"
ﺷﻜﻞ) (7-3ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﺏ"
אوאאאאدW
אدא
و 56
(3אU4 8#=وEchat roomsFh دo_א/3Lא/w½ 1 د=אM
" د77#$א- 77V8?ن-/77Y?،EphishersF دون77b א77Yr77 ن77
t77א77 א
- 7VCאfx78.نو=אa7،7S^وא7W73L 7x]² IO}$ م4(%&('و$א
EphishersF6 د77bא7777
+4 77Z77 ل77kM77b^77
/77
^ ص77W?
77OB776BOMEhackersF/¹ 7 ^وא،EspammersF77/אg77 77/א%77
/}و
ل77א77- 774k+774E 77I8w77&
m77&?77א=אfx778-77
وK- 77VCא
7
،EcashersF7boوאEcollectorsF7وאEmailersF7/
bb^א
W% אM_/± 8
EspammersF7/אg7 7/א/} a<8وWEMailersFن/ אJ
g7 / א8د4= لaU4+=`<אY66xא،EhackersFن/¹ ^ ?وא
KEfraudulent emailsF لS$_אY/א
d77LوאאאB77Y
6x77אEhackersFن77/¹ ^<א778WECollectorsFن77 אJ
7776<7776t777وא، ل777S$ضא/777Efraudulent websitesF777]6Bא77&א)('و
(1) Christopher Abad, “The economy of phishing: A survey of the operations of the
phishing market”, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S. Myers,
“Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
Identity Theft”, Wiley, 2007.
57
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 58
Mg37
=/7nµא7Saza 8א6،`r»6/Zوאb^אא- & H/ZO
%7دא/7 مא7c&?و7 (א37א74.א،]^ لאbO$`א אh
K- cI لאوאbO$<و א8g?و،FO Cא4
The Anti-Phishing F%7&" دא)('و7#$ א7/J7bא7474k
- 4 I7bאF7\7ZU747 4§%8K1 EWorking Group – APWG
7=747¤ Iאb^ لאi&אאعوא- Jb&&] ذא`אa Yr8
K%&" دא)('و#$א
J7bא744kmO4?Jxא2007 م4r&/YW2 /6/`OM
W/YذאMw3`א4?نא/Y?EAPWGF%&" دא)('و#$ א/
K" د#= א4ً p28074 •
- 7cI7&('وad7Lא4]6B&('وadLא4ً p23630 •
K``S
7=-p776/74Ebrand hijackF Y]6BO6= ¤p4178 •
w7LوU7S،7Sوא/Y7WMV7Z<7L=U74?<L/7אאx78وK%7&('و$" دא#$א
K/Yאx/6/`א=א#a
U74-7S א7YI4¥73א%7&('و$" دא7#$ع= אk٪34.3 •
ل777KEdomain namesF- 777L "&. 7 7?777P8U7774777&('وad777Lא777=وא
KExyzbank.comF
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 60
ﺷﻜﻞ ) (8-3ﻋﺪﺩ ﺑﻼﻏﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳌﺴﺘﻠﻤﺔ ﺷﻬﺮﻳﺎﹰ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ﺷﻬﺮ
ﻧﻮﻓﻤﱪ 2006ﺇﱃ ﺍﻟﺸﻬﺮ ﻧﻔﺴﻪ ﻣﻦ ﺍﻟﻌﺎﻡ 2007
ﺷﻜﻞ ) (9-3ﻋﺪﺩ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳉﺪﻳﺪﺓ ﺍﳌﻜﺘﺸﻔﺔ ﺷﻬﺮﻳﺎﹰ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ﻣﻦ
ﻧﻮﻓﻤﱪ 2006ﺇﱃ ﺍﻟﺸﻬﺮ ﻧﻔﺴﻪ ﻣﻦ ﺍﻟﻌﺎﻡ 2007
61
אدא
و
Wאوאאאאد
ﺟﺪﻭﻝ ) (1-3ﻗﺎﺋﻤﺔ ﺍﻟﻨﺴﺐ ﻟﻜﻞ ﻧﻮﻉ ﻣﻦ ﺃﻧﻮﺍﻉ ﺍﳌﻨﻈﻤﺎﺕ ﻣﻦ ﺣﻴﺚ ﺍﺳﺘﻬﺪﺍﻑ ﻋﻤﻠﻴﺎﺕ
ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﳍﺎ
ﺍﻟﻨﺴﺒﺔ ) (٪ ﻧﻮﻉ ﺍﳌﻨﻈﻤﺔ
93.8 א -א EFinancial ServicesF
ﺟﺪﻭﻝ ) (2-3ﻗﺎﺋﻤﺔ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺸﺮ ﺍﻷﻭﱃ ﰲ ﻧﺴﺒﺔ ﺍﺳﺘﻀﺎﻓﺔ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ
ﺍﻟﻨﺴﺒﺔ ) (٪ ﺍﻟﺪﻭﻟﺔ ﺍﻟﺘﺮﺗﻴﺐ
24.21 א b 1
23.85 א- 6$א+iא (6/ 2
9.39 א IC 3
8.06 =و 4
4.64 I6 O 5
3.53 =و & 6
3.41 ? & 7
2.42
= 6א IX 8
1.47 א(א +i 9
1.47 Z&/r 10
אوאאאאدW
אدא
و 62
77(6/א+77iא- 776$אM/ 77Z?نא/77Y?EGartnerF771 77 M
3.2za2007 م74Mbw]O=אL%&('و$" دא#$א- V8¤ Iא
%7&('و$" دא7#$א- 7V8Mً 4 ]O= ًא,6?/6/`א/Y?وK%(6/?=$دو6p
- 77L "3א- 77Z³77&= `،r/77bא- 77Z@وא776= Xא- 77L "3א- 77ZSU774
_= 7bא7I4 ل7S$א- 4_
אc&?Fnza03Zאd
/6א) &و
K& $א- L "3א-
/Wza3ZI YI4
م747N"7Z?/Y7WMJ/7
?عp"7אU74ًא. 7Im7&?ً 7,6?7א/
وذ
- 7V8?ن37O7(6/א+7iא- 76$אM^7W4500/
2007
777 777&= `،2007 م777אM777
?ً 7 7S ¼w777``S%777&('و$" دא777#$א
774" د7# א7=א3`7א6x7^ صא77Wא7K٪3,337Z&w7 L،` 7Zא
" د77#$ א77=0377Z77 / 77Zא77n/O<77Y&a%77&א)('و776א776/
J?،m`377Jx77 مא77אMm77Z]&.%77א77n/O٪2.377777&= `،%77&('و$א
Y 77- 4p"77אU774ًא. 77I2005 م77א772.9777 77,6?77&= `و،2006
.EGartnerF3Lw6/
?
(1) Media Relations, 2008 Press Releases, Gartner, “Gartner Survey Shows Phishing
Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks”, 05-March-
2008, (http://www.gartner.com/it/page.jsp?id=565125).
K&א א)('و-p6iوא- 4rאMbb^
/W E2F
K (א3א6/4BV d3אMbb^
/WE3F
63
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 64
65
אدא
و
Wאوאאאאد
ا"! اا1
أ
2ا
./0د ا('&و
)(Phishing Techniques
ﺗﺴﻤﻴﻢ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ )(DNS Poisoning •
(Phishing
The Popup ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳـﻖ ﺍﻟﻨﻮﺍﻓـﺬ ﺍﳌﻨﺒﺜﻘـﺔ ) •
(Attack
ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ )(Fake Address Bar •
אدא
و
Wאوאאאאد 66
67
אوאאאאدW
אدא
و
/6}
K=وBdLzag6ً ]ً 6/4ً &אI4d
gm&{r،د
- L "Iא. ?U43"I6m&{r، ل
אدM
אא@ لx
و
07"Ot7אd7Lאא7 78g =_و7b- L "Iא. ? YInو،\/ א
K6/ وZSb^W- & 6وBO
אوאאאאدW
אدא
و 68
( ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ1-4) ﺷﻜﻞ
77778?_?س/7777b ق7777"I<א7777?نאE2-4F(7777אM 7777
ض/7777]I
" قI_?س?א` )<א/byibאJ/אنאIو?نא،Exyzbank.comF
x7 ق7"I<א7^ אW
Ir،E88.33.22.11F8Exyzbank.comF
–^77 زא77Y
`م77EInternet BrowserF77 (א377אy]77bM_/77bא
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (2-4ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ
ﺷﻜﻞ ) (3-4ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﺣﺎﻟﺔ ﺍﻟﺘﺴﻤﻴﻢ
אوאאאאدW
אدא
و 70
(Hosts File Poisoning) ﺗﺴﻤﻴﻢ ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ: ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ2.4
H7?- 77Sza-%&('و$" دא#$א0 ?Hאאx8m36
<7ZEhackersFن7/^مא7`6H7אאx78MK- 7L "Iא. 7?< دمZO
Ki, زאY
Mא
دEhosts fileF],אאدمאF
m]7b6/7 א7YI6 وI4و- 7L "Iא. 7?7]7,אدمא7אF7/6
ElocallyFً 7m7<(i](א,אאدمאF?ن$a؛- L "Iא. ? دم
K^مZ زאY
3L
אن77Iא774v77i3 ً$م?و77`677 زא77Y
{ن77r، 77d77L07777I4
7J/7אنא7Iא74مp7$א73Lאدم7א- 7]M دم7<א7$J/א
K- L "Iא. ? دم
م7c&M]7,אدمא7אF7M%א7$אV7ZאE4-4F(7ضא/6
.EMicrosoft WindowsFوزI6وwrو/(6 א
7/7א-pV7{ن7r- 7L "Iא. 7?< دمZOH?M &/
ذ
za 6 i7,אm7
/¹ ^א3L 8gO<66/ אYI6 وI4و- L "Iא. ?
م7`6vS],אאدمאF<ZOH?Mً ,6?mZ]&]؛وא@ ل6BdLא
77وذ،i77, زא77Y
M]77,אدمא77אF77<77Zm77Z]&.%77 ن77/^א
KF6BdLJ/4אنIא<&" ق/6
Vdn
i7,אm7
O<H/¹ ^א3L _ ,אVZאE5-4F(ضא/6
m7&אI4 ?نI7n'rאJx7وא%7#אd7Lא7ً$7E92.45.67.89FF6BאdLאza
KE88.33.22.11F
71
אوאאאאدW
אدא
و
localhost 127.0.0.1
xyzbank.com 92.45.67.89
W%
K\/ ?dLאzayibאdLא/زאm
O+ د4a J
KdLא/ ززאY
MEmalwareF3 qא/0
/O J
K%&('و$" دא#$ دمאzadLאM א- & 3אm
O+ د4a J
W\o`אS"" دא#p ??&אعhphE I8
EhackersFن7/¹ ^مא7`r،7 (א37 دمא7 MI?+/hلp אJ
KEmalicious contentFv3 \iElegitimate contentF%#\אoאلא3
EhackersF/¹ 7^y7ZO7 (א37 دمאMI?+/hلp אJ
Cross-Site Script – F77+/7אfx78_/7OKאدم7אfx78M73 k/`?
אدS
73L 7_ 7,\77q}7I6EProgramming FlawF%7k/7 %78و،EXSS
אوאאאאدW
אدא
و 72
<7`O?و،EblogsF- &و7אM=وאB7א- 7`O، ل7א3U4K%
= =b
?و،Ediscussion boardsF ش7`Iא- `SM =?و،Euser reviewF qI=وאBא
U747א%7&א)('و76אM+?و= وא=د،vi3א-
/Mv³-
KEweb-based emailF (א3א
7L` 7Zא7אM 7
7
= = د7b3L_ ,\אoאאx8
73Lوض/]8
Y]bO<6 3 k/(?
אدWU4\(ن6
m7I4q7I6 7¯،=وאB7א73L- r na3`OtאdLאאfx8],Zאאدمא
KdLאi]#ض/4I4 6 i,אy]bU43א
אدאfx84
1 ECNET News.comF= 73 ?M و=د7ع7Iאאx78U74Lאאא
<YL77M77I?+/77hyi77bO774نp4) 77gY77א2?PayPal?d77L م77L 77I4
+ د74azaJد76<YL7Mv73 dL`Sو، (א3אU4%&א)('و
KF6BdLza& $אL "3א- & د لai]#0I4i,אm
O
78\7oא7`S"7א%7&('و$" دא7#$אعא7&?7v7 عאI אJ
773
/مאp77$א7776/7477`@א+/77hU7ZOd77LאM7I?+/77hلp7א
- 77& 3א+774 LM/77?x77]IO<77677`6/"אfx778MKESQL injection vulnerabilityF
(1) “PayPal fixes phishing hole”, by Joris Evers, Staff Writer, CNET News.com, Published:
June 16, 2006 4:12 PM PDT, (http://www.news.com/PayPal-fixes-phishing-hole/2100-
7349_3-6084974.html).
K (א3אU4BV ddL (2)
73
אوאאאאدW
אدא
و
(1) “Knorr.de SQL Injection and XSS Vulnerabilities”, Sebastian Bauer, 01/12/07,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQL-Injection-and-
XSS-Vulnerabilities.html)
אدא
و
Wאوאאאאد 74
<776א773L77 77א 77bد. 77&a776/774א 77bOل7777(77b]I
א ^77Zموאd77Lא/77אدא 77bO$ل،m77و77(6نא 77bدMא77F77bIא^77Zم
وא by6 ،dLدא` 3لא- & 3א bد=+א^Zمzaא74Md7L
א bO$لא،EInstant MessagingF/W 3و<7hא، 7Y074pو 74aد+/7 C 7=a+
? za\/אdLא Jxزאل?c6نא- & 3אא=د Lma+دא^ZمKو
SMא)= ل
SMxא/د{rنא bد?`6ً ,6م ` C 3و 74a<7hد+
za C =aא^Zم
Mא( KE8-4F
x8Mאא?/Yc6Hنא bO$ل$?r/77<6و 7Y
78زא^7Zم
?Fوא،Eو
Yزא?FdLوא دمM<8(KEא@``'6א7نא74- 7& 3
Yز /و?7_/6אM
/א? KEMan-in-the-MiddleF
ﺷﻜﻞ) (6-4ﺍﻟﺘﺮﺍﺳﻞ ﰲ ﻭﺟﻮﺩ "ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ"
ﺷﻜﻞ ) (7-4ﺍﻟﺘﺮﺍﺳﻞ ﺍﳌﻔﺘﺮﺽ ﺑﲔ ﺍﳌﺴﺘﺨﺪﻡ ﻭﺍﳌﻮﻗﻊ
75
אوאאאאدW
אدא
و
( ﺍﻟﺘﺮﺍﺳﻞ ﰲ ﺣﺎﻟﺔ ﻭﺟﻮﺩ ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ8-4) ﺷﻜﻞ
^م7Z א77א'א4لp אM
/אV8 r(نOL
Kא'א4?و،dLوא
?7Iمא7V8?77 7U7ZOو،7א'א74لp7 7VCא74 r(نO
^م77Z א77- 77& 3אr77Oلp77 EcontentF\77oאg77،EActive AttackF
אدא
و
Wאوאאאאد 76
ﺷﻜﻞ ) (9-4ﺗﻐﻴﲑ ﺭﻗﻢ ﺍﳊﺴﺎﺏ ﺍﶈﻮﻝ ﺇﻟﻴﻪ ﻣﻦ ﻗﺒﻞ ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ.
\77Saא"/77ق"77V8?773אM77
/א 77 <77ZO%778?77دم?. 77
א6/4EDNS PoisoningF- L "Iאg7-pVZ 04pא 7Iو6א6/7
zagO%אU74ً$ 7K7]6Bd7Lذ077אp7$م74א7IאنאJ/7
?_/bس?{rذא
ن دمאp$م،ً ZوאVZ 04pא7Jx
7 dدم?. 7א- 7L "Iא7Iאن
אIאنאxJ/א?ً$3r،_/bن} /6
I4dא&g76ً 7]ً 6/74ً 7
אJ/א "&<$yibقא?_/bس? /}m&{r
BdLzaو=4אdLא?_/b%#س? K
x8d`6אאdLא+/"7wF6Bא 7bد
B76 7IrKً 7ود74א_/7b
FאdLEi,א< F6Bא^Zم،و=B7אF76/א^%7bوذ 77ل
(776،m 77ZSzaא 77bدfx77877r/77א- 77& 3א،6/77Zو77`6<77h77مא 77bد
^ d0אdLא?_/b%#س?b^WxًpiIאא Ki,
5.4ﺍﻷﺳﻠﻮﺏ ﺍﳋﺎﻣﺲ :ﺗﺸﻮﻳﺶ ﺍﻟﻌﻨﻮﺍﻥ )(Address Obfuscation
`6مא bدونx8Mאא، dLF6BHووw7m7nא 7"&<7ق
m36א<&" قאdLא KU#
6א bدونx8Mאא?zaHن(6نא<&" قאd7Lאً 736/LF76B
77
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 78
ﺷﻜﻞ ) (10-4ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﺏ"
ﺷﻜﻞ) (11-4ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﺏ"
79
אدא
و
Wאوאאאאد
ﺷﻜﻞ) (12-4ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"
ﺷﻜﻞ ) (13-4ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"
אوאאאאدW
אدא
و 80
ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳـﻖ ﺍﻟـﱪﺍﻣﺞ ﺍﳋﺒﻴﺜـﺔ: ﺍﻷﺳﻠﻮﺏ ﺍﻟﺴﺎﺩﺱ6.4
(Malware Attack)
لp77 77H77אאx778MEi77,אF^م77Zא- 774d77§y377bO
qא77אzaد776F77(אאx7780377K6 د77br77(77 (א377אy]77b
K^مZ زאY
M4=وBאEmalwareF3א
لp7 7+x]Iא- אd§3Lא/ دb3אqאאfx8yZO
ل7bOא7I4 ل7א37U7rK(i7,^م)א7Zא73L (א3אy]b
،^م7Z<א7$^م7Zא76وBO7I4و، 7_/7b%&א)('وdL ^مZא
fx787د7
و7 S%7]r،M/bאm ZSU4 ل%b^אF6/אB=و
د7bאza C 7=aو،6/7Zא- 7& 3אfx78 ط7`a<7Zri, زאY
Mqאא
_/7b%&א)('وdLאd אM^مZאb^Wf=وiIJxא
K%``@אאm&?U4 دbאd Jxא
77S-א/77`&V77Z077
/O%778H77אאx77C+=Y77قא/77"\א77Sa
V77Zم77`6m77א77Jx77وא،i77, زא77Y
MEKeystroke LoggerFyO 77]א
אوאאאאدW
אدא
و
אدא
و
Wאوאאאאد 82
و
א/و=،وذ
`iאIאنא?،J6وgذ7א 7¯،H 37
}^Zً `"Iً 33%"6مP3אIذج K
א_Cא@``%א+xr Iא(F +א+xr Iא. 7"4a787`3Iא ^7Zم،
?و774א_/77bא=77Wi77,אً4/77א"،077وذ 77SM77ل 77#د_
&m77
xًp4א K_/b
אوאאאאدW
אدא
و
1 http://www.microsoft.com/ie
אوאאאאدW
אدא
و 84
www.contentverification.com/graphic-F77777777777777nو/אi]77777777777777bא777777777777774
KEattacks/demo/adbarframeset.html
/7 y]7b^אم7 7(و،mZ]& Zא لאE16-4F(ضא/6
774 F77(IOv77S،9.23<77L=^77ZIא،EOperaF1 ?א/77??و77 (א377
אن77Iضא/774%778و،א/77?وy]77bאM+د77
א77# א0377Zאن77IאF776BO
Mً 7,6?وK7nو/אi]7bא73L7אنIא6/W. ] a لSMdL%``@א
אن77Iא6/77W\?ن/77&و،F776Bאنא77Iא6/77W 77b ض/774m77Z]&(77א
KEgifFאد$ EimageF+=#8F6Bא
( ﺷﺮﻳﻂ ﻋﻨﻮﺍﻥ ﻣﺰﻳﻒ ﻋﻠﻰ ﻫﻴﺌﺔ ﺻﻮﺭﺓ15-4) ﺷﻜﻞ
(1) opera.com.
85
אوאאאאدW
אدא
و
"( ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ ﰲ ﺍﳌﺘﺼﻔﺢ "ﺃﻭﺑﺮﺍ16-4) ﺷﻜﻞ
t7?_/7b1 µ7S 8F6BאنאIא6/WH?U4/ ل
777iI777&('وa7776/ 777=w777=? 777I4،%777(6/אECitibankF2 ?777I
77777877777/ אنא77777I4 ن77777
و،E17-4F(77777אM 77777
_/77777bא77777b^W
و،?7It7d7%&א)('وE6/`?WאنIوאsupport@citibank.com
(1) http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
(2) www.citibank.com
אوאאאאدW
אدא
و 86
6אאx80"6K?It?W_/b.p4<86אאx83LrYZאP]א
אن7I4777`iא4 )
ل/ אא
د/אU4,אm3`Z}
_א/7bא7L "<7L=mI0"6´ذج/אB/Yc6א/אd3OI4K%&א)('وf6/
PIN – Personal F%77b^אF776/אB77=وEATM/Debit card numberF%77א
אدא
و
Wאوאאאאد
ﺍﺷﻜﻞ) (17-4ﻧﺴﺨﺔ ﻣﻦ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻨﺘﺤﻠﺔ ﻟﺸﺨﺼﻴﺔ ﻣﺼﺮﻑ "ﺳﻴﱵ ﺑﻨﻚ"
אوאאאאدW
אدא
و 88
"( ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﻴﱵ ﺑﻨﻚ18-4) ﺷﻜﻞ
?< 77@א%77bIא6/77?אU77Z6F776Bאنא77Iא6/771 /7 H77?
ن77(M. 77,77]®EText FieldF%77b&77`Sd77nو778وEhovering text boxF
(1) http://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/
89
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (19-4ﺷﺮﻳﻂ ﻋﻨﻮﺍﻥ ﻣﺰﻳﻒ ﻋﻠﻰ ﻫﻴﺌﺔ ﺣﻘﻞ ﻧﺼﻲ
אدא
و
Wאوאאאאد 90
ﺷﻜﻞ ) (20-4ﻧﺎﻓﺬﺓ ﺍﳋﺼﺎﺋﺺ ﺗﻮﺿﺢ ﺣﻘﻞ ﺍﻟﻨﺼﻲ
91
אدא
و
Wאوאאאאد
(Toolbars
ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ )(Anti-Phishing Softwares •
87
אوאאאאدW
אدא
و 92
1 ﻣﻨﻊ ﻫﺠﻤﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻗﺒﻞ ﺣﺪﻭﺛﻬﺎ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ1,5
%7&('و$" دא7#$א- 7V873L7 YrאY7אoא- cI{( نא
" د777#$א- 777VC- 777cIאfx77787 7` و777Z Y&777W777-א.א/777
a ذ7 7lא
" د77#$א- 77V877q77IO77Lt77א/ 77Zא77`Oو، 77Y4Lو773L%77&('و$א
K%&('و$א
W% א-א.א/
)אfx8Oو
ﺇﻧﺸﺎﺀ ﺣﺴﺎﺏ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻠﺒﻼﻏﺎﺕ1.1.5
7/א74غp7)<אCUIZ%&('وa6/אنIcIא.p46وBO
77/אfx778w77&
ذאa 77/776/`H 77Z@אאx778y77Z6K77cIא77b^77iIא
K6=
" د#א- V84ًא=אx&aً ,6?%"6و،$?مii#
(Bounced E-Mails) ﻣﺮﺍﻗﺒﺔ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪﺓ2.1.5
U774 7777cI77b^77iIא%77&('و$" دא77#$ א77=J7777L
3`7Z دمא7 7`i6 I4KdLאאM+
دg
]&('وa6/6 وI4
= 7Wad77/ دمא7אza 7Y
gr،m76V7Zg Y&?°6 وIאfx8
Km6VZgm&3`Z אzabO /אfx8ن
7b+7O/ א/{نאr cIb^WiIw² =? / ?نא
- 74zag7O+7O/א766 א/א+/
K Yb^WiIאcI دمאza
K6=
" د#א
1<77L=+77"אM،Ebouncing emailF77O/א776אE1-5F(77אy77n6
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (1-5ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪ )(Bouncing Email
3.1.5ﻣﺮﺍﻗﺒﺔ ﻣﺮﺍﻛﺰ ﺧﺪﻣﺔ ﺍﻟﻌﻤﻼﺀ
/א77
773Lא-$ 77bO$و773א= 77Z]$א-א77א=د/za+א
77 B77
אوאאאאدW
אدא
و 94
d7Lא74 ل7א7r=7- =א7Z]$א7+د7oאعא7&א37rK.pא
K" د#א- V8
د%SOL%&א)('و
ﻣﺮﺍﻗﺒﺔ ﺣﺴﺎﺑﺎﺕ ﺍﻟﻌﻤﻼﺀ4.1.5
-$ و7777d77Lg77د77
،- 77Z@אU774- 77אF77773Lא/
?و-p6777i?وא،%777b^אF7776/אB7 7=g777O?و،- 777Z@אza ل777א
K =_אb אSM- iZא
ﻣﺮﺍﻗﺒﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺼﻮﺭ ﺍﶈﺘﻮﻳﺔ ﻋﻠﻰ ﺷﻌﺎﺭ ﺍﳌﻨﻈﻤﺔ ﺃﻭ ﺭﻣﺰﻫﺎ5.1.5
r ,Zزא/وא-=א =א#- ] & ًא^אمS? دونbא6
M7=7#- 7]^אم7א7ً$7،7]6B<אYLאMrYZאcIא3L
K]6B<אYO i]b],ZאאدمאM?و،<Yאد
F77,Zא7 (א377 دمא7 773L7-$ 77@אfx7877_ 7
א7(
8= 7WوcIאB==#- ]% F,Zوא،cI%&א)('وdL
7`Iلא7
Oو/07d7 دم7`אEreferrerF?/7W?א7`S77`iא76/4
،+=7bאF77iEHTTP – Hypertext Transfer ProtocolF07א%7bIא
77`S ن77
ذאaK+=77bضא/77t77א77&א)('وi]77bאنא77I4(ن77Jx77א
07r/76 دم7{نא7rل7YkאنI4za?و،cIאنאI4gzag6?/W?א
+=77#-/77 ًp7S7 6} 77– دم77ضא/77677L?و،+=77bאF7777iHTTP
K"א+=bًא$،m3I6/6x
ل7
Oو1 - 7`א077`hو0ZirK Sza ل± r.א/
)אאx8
، دم7א+7 ]d7nوEreferrerF?/W`?אS{نr،EHTTPF0א%bI`אIא
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 96
77#_א/77b =א77W+=77#^אم77 دא774?وF776Bd77L. 77&{6 د77bא
KE2-5F(אM
_/b دمא3Lr ,Zא
?N77O?_/77b%77``@אd77L+=77#ض/776E5-5F(77ضא/76
K?NO?_/b= +=#ض/6E3-5F(وא
? 78B=?وcI =אW6o=אbא^אمא3Lא/? د, א.א/
)א3"O
77`i 77rK77O%77&('و$" دא77#$א77V877_/77bא77ذ%77i ن77
" د77#$א774F77( ن77
_/77b =א77W+=77#F7777077= د77b
(7אM 7
/6x7i7Y3IO+=7bد/ C ra_/bو(©א%&('و$א
Md7`6?ن73Li7,א/7אBאm73IوذcI =אWFد/ًא$E4-5F
K%&('و$" دא#$אr
ل7אאx78ME4-5F(7אM-و=دt7א76/6xiאm73I א7=\
<7L=d7nوو،?KKK777bOאJ/7Zא7L=07(Opr، 7/אfx8w6?=ذאa?8
K لbOp
97
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (2-5ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺗﺸﻴﺲ"
ﺷﻜﻞ ) (3-5ﺷﻌﺎﺭ ﻣﺼﺮﻑ "ﺗﺸﻴﺲ"
ﺷﻜﻞ ) (4-5ﺭﺳﺎﻟﺔ ﺍﻟﺘﻨﺒﻴﻪ ﺍﻟﺘﺤﺬﻳﺮﻳﺔ
אدא
و
Wאوאאאאد 98
ﺷﻜﻞ ) (5-5ﻣﻮﻗﻊ ﻣﺼﺮﻑ "ﺗﺸﻴﺲ"
2.5ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ :ﺍﻟﺘﺼﻔﻴﺔ )(Filteration
} 77=]77bO7 Oא776א)('و&%77אM YS/77W377t77א]77bא%& 77
/7
a Y]7bא 77,.دאًg77 7/א 77, 7Y&
M77 rً 7,6?ESpamF7/دאً
- 7VCא "77#$دא'($و&%77א 77=U774+7א76א)('و&M%77א77אع
KEdeception-based phishing emilsF
99
אوאאאאدW
אدא
و
(1) “Firefox flaw raises phishing fears”, by Ingrid Marson, Published: January 7, 2005
11:06 AM PST , (http://www.news.com/Firefox-flaw-raises-phishing-fears/2100-
1002_3-5517149.html)
אوאאאאدW
אدא
و 100
Kyi#dL
Zزpא- 6i?אN
r/6 rp6?ز-=#?+/אfx8_
א
ع7Lא/7" J د7]m76y]7bא%^7Zd7§U7407
وو،+/אfx8
K+/אfx8لp$in
Cross-Site Script ) ﺗﺼﻔﻴﺔ ﺍﻷﻛﻮﺍﺩ ﺍﻟﱪﳎﻴﺔ ﺍﳋﺒﻴﺜﺔ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ4.5
(- XSS
7Emalicious content injectionFv73\אo`אSH?M &/
ذ
v73 \77`S?وr n{`ن66 دb?نא،%&('و$" دא#$א0 ?
\7oאאx78م7`6?ن7(KElegitimate siteFyi#dLza Emalicious contentF
W% v3א
K\/ ?dLאzayibאdLא/زאm
O+ د4a J
KdLא/ ززאY
MEmalwareF3 qא/0
/O J
K%&('و$" دא#$ دمאzadLאM א- & 3אm
O+ د4a J
M7I?+/7hلp7א76/74\7oא7`³H7(`ذא
fx78M73 7k/אد7
?7`SEhackersF/¹ 7^y6 (א3 دمא
%77k/77 %778و،Ecross-site script - XSSF777+/77אfx778_/77OKאدم77א
37U74K%
= 7 =7b73L7_ ,\qI6Eprogramming flawF
،Euser reviewF 7q7I=وאB7`<אO?و،EblogsF- &אوM=وאBא- `Oא ل
- 77
/Mv77³- 77
?و،Ediscussion boardsF ش77`Iא- 77`SM 77=?و
אوאאאאدW
אدא
و
KEweb-based emailF
H77%77&('و$" دא77#$אi77nع77Lא/77" J د77]U77א77`6/"א
دم77אM 77Yc]S773L 778 دaאدو77
אfx778]77bO778،v773\א77oא77`S
K=وאBא- i]bU4 Yn/4م4 نn% و
(Visual Keyboard) ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ5.5
<76و،76`א7`6/"א746/7Zא- 7& 3 لא7 )د76`6/fx8O
= 77Àو،77& لא)('و77אi]77#M77/yO 77]77S776/774 77C دa
yO 7]א7S7H7" א7]אU74/`Iوא+=]א6/" אYI^مZא
KW אU4/א
776/7746/77Zא- 77& 3אL/77Zً دא77,¿.א/77
a77/אyO 77]א77S773"O
ز7Y
7Ekey loggingFyO ]אS-א/`&VZOtאEmalwareF3אqאא
صp^7وא، Y7iم7`6Jx7א، د7bאza C 7={م7`O<7hو،i,א
Ki,אb^W لi&$- & 3א
^77Z =_א77bא77S77/אyO 77]א77SE6-5F(77ضא/776
Km ZSza ل6/Zאא- & )د ل
/67"OאنU7S6 د7b7Z6<r، Sza ± r/אyO ]אS
^אم7א7©L7M7/אyO 7]אS43"א- & 3` طא$3 qא/
K&א)('وdLאאM/אyO ]אS
- 77& 3אU774_/77773 qא/77/677"O77ً 7`S$ن77/¹ ^(א77677L
K/אyO ]אS"א(א
אدא
و
Wאوאאאאد 102
ﺷﻜﻞ ) (6-5ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ ﰲ ﺻﻔﺤﺔ ﺍﻟﺪﺧﻮﻝ ﻷﺣﺪ ﺍﳌﺼﺎﺭﻑ
אوאאאאدW
אدא
و
7مא7`6J7`Iא0i7Zא74MK%7_א/bא+BY
?J`Iא0iZ
7
ً{د ل,6?`م6و،?? ذא
؟%& عאIאOtوא،L "3{د لא
K?_؟/Oعאول? ذאIא6Jxو=א/א
77
77،6/77Zא- 77& 3قא/7ZO%77&('و$" دא77#$א- 774M+ د74
\/7 ?- 7& 07<76x،?_؟/Oعאول? ذאIאF»IbOtא،=و/א
67bאعא7&?76/7 א4Iאza%IO- & 3
،6bא4Mr na
K?؟w&? ??و،?? ذא
؟
74%7&('و$" دא7#$א- VCً دא,ًא.א/
a^مZ6% Iא6bא
" د7777#$وא،EMan-in-the-middle AttackF7777אM7 77
/א7777V877776/
אوאאאאدW
אدא
و 104
(Mutual Authentication) ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ7.5
אx78MKETwo-way AuthenticationF?f ¤$א% Iא6b?א7ً ,6?_/6و
677b دم77مא77`r،/77 אY77, دم77وא77א77ٍ7
ق¹7 b6}.א/77
)א
N6 7`
،6bو אfg?و،%b^אF6/אB=6/4א
m7&?77`i6و،7א73L7א دم6bO<6ً ,6?و،EBiometricsF6@א
Kً ]6Bً L(ن6א دم
نb^iINو،دb` دمאb
77`iً 7L/ ل7bOא74Mr/7"א77( دل73א6bאy6
K3 Y,68i#
(7אy7n6؛وf 7¤$אJ د7Sא67bא74E7-5F(אyn6
K دل3א6bא4E8 J5F
م7`67Sm7&?%78،א3Lא دم6b^Zقא/"\אSa
^م7ZOEphraseF7§?و+=7#= 7À7{نא7r دم7\אVZ א
م7`6، دم7 لאوאbOא. &aIrKא3Lא دم6b `S$
+=7bאw7&
{ذאr،VZא4Mً `3Z+دoאXوא+=bضא/א دم
Kא دم6bO<6ii#Xوא
74%7&('و$" دא7#$א- 7VCً دא7,¿.א/
a^مZ6 دل3א6bא
" د7777#$وא،EMan-in-the-Middle AttackF7777אM7777
/א7777V877776/
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (7-5ﺍﻟﺘﺼﺪﻳﻖ ﺍﻷﺣﺎﺩﻱ ﺍﻻﲡﺎﻩ
ﺷﻜﻞ ) (8-5ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ
אوאאאאدW
אدא
و 106
-
/77א77776 مא77L%7 &('و$" دא77#$א- 77V8/77" U774ً=دא
-?دوא/777W? ج777& ?wr777و/(6 ?7777
،- 777kא%777VI?وeBay?
/777
U7774EAdd-onF- r 777na0777
/O%7 7&('و$" دא777#$א777ir (M777bb^
KEE-Mail ClientF%&א)('و6א4qא/و، (א3א- i]b
" د7#אd7LאmO= 6زI4^مZאm3IO8 م4(/Wאfx8]و
U74_/7א%7&('و$" دא7#$אir (-?دوא/W?لp 6K83
m7O= 6אدز/7אd7Lא74مp$א6/4%&('و$" دא#$?و= אdLא
7YrV
± 7ZO}EdatabasesF- 7& 74אL7א=د7א6א4?و،^مZא3L
Y67<76tא،83א(]?وא.א،%&('و$" دא#$و= אdLא
76/74?و،%7&('و$" دא7#$אd7L _א7
אM7bb^- Y
3L
M7`ً 7L/^م7ZO-אدوא7وK6/ ^Z+אא=د- p3א
7736/Vقא/77"א773"
،%7 &('و$" دא77#$אd77L وא77=U774_/77א
" د7#$א- 74_ 7
$EpatternsF/8 7cאU74_/Eheuristic methodsF
K%&('و$א
" د77#$א77ir (-?دوא/77W?F77^77 LE1-5Fول77Xضא/776
K (א3אU4 Y"=وאzar n) ،%&('و$א
Phishing Fq 7&/،%7&('و$" دא7#$אir (-?دوא/W?U4ً$
אx77877`i6K 77Z^א77ZI==?א377Z
aw77&'&a?y]77bאd77q77א1 EFilter
8377i]77bאw77&
ذאa، 77YO= 6^مز77Zא077"6i]77#77
77q 77&א
/6x77i/]77# نא77=ز-אن77Iא6/77W077& Q-y]77bאU774?M/Yc77Zr
אوאאאאدW
אدא
و
"( ﺷﺮﻳﻂ ﺃﺩﻭﺍﺕ ﺟﻮﺟﻞ ﻋﻠﻰ ﻣﺘﺼﻔﺢ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ "ﺇﻧﺘﺮﻧﺖ ﺇﻛﺴـﺒﻠﻮﺭﺭ9-5) ﺷﻜﻞ
(Internet Explorer)
1 crypto.stanford.edu/SpoofGuardL
אوאאאאدW
אدא
و 108
. ﻗﺎﺋﻤﺔ ﺃﺷﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ.(1-5) ﺍﳉﺪﻭﻝ
ﺭﺍﺑﻂ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ ﺷﺮﻳﻂ ﺍﻷﺩﻭﺍﺕ
microsoft.com/ie Internet Explorer 7 Phishing Filter
pages.ebay.com/ebay_toolbar eBay
www.callingid.com CallingID
cloudmark.com CLOUDMARK
earthlink.net EarthLink
toolbar.trustwatch.com TrustWatch
crypto.stanford.edu/SpoofGuard SpoofGuard
אدא
و
Wאوאאאאد
ﺷﻜﻞ ) (11-5ﺭﺳﺎﻟﺔ ﺍﻟﺘﻨﺒﻴﻪ ﻋﻦ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﰲ ﺍﳌﺘﺼﻔﺢ "ﺍﻧﺘﺮﻧﺖ
ﺍﻛﺴﺒﻠﻮﺭﺭ"
אوאאאאدW
אدא
و 110
Anti- ) ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘـﺮﻭﱐ: ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ9.5
(Phishing Software
- 77V877n776 @אEsecurity softwareF776 @אqא/77<77c77,O
אوאאאאدW
אدא
و
אوאאאאدW
אدא
و 112
Chat Rooms
h دo_א/
Commercial Whitelists
6= Vא. ,3א`א<א
Computer
H S
Configuration
3nLאد4אLPYO
Content
\
Cracker
H»/
Database
- & +4 L
Data Integrity
- & 3אE (O?وFp
Dialog Box
J=אSوقI#
Dictionary Attack
א` سV8
Discussion Boards
` شIא- `S
DNS Poisoning
- L "Iא. ?< دمZO
Domain Name
" قIא<א
Download
E-mail
%&א)('و6א
E-mail account
%&א)('و6אH ZS
E-mail address
%&א)('و6אنאI4
E-mail client
%&א)('و6א4q &/
E-mail Filtering
%&א)('و6]אbO
E-Mail Header
/=?سאZ6و/O
E-Mail Route
%&א)('و6 == אZ
113
אوאאאאدW
אدא
و
E-mail Server
%&א)('و6 دمא
Fax
EN
]אF &
Filtering
]bO
Firewalls
6 @
א=א
Form
´ذج
Forums
- 6Iא
Hackers
Eز/
CאF (א3אL'
Heuristics Methods
36/Vقא/"א
Hosts File
],אאدمאF
HTML
0א%bIאB'א
HTTP
0א%bI`אI
لאO/
Inquiry
مpא
Install
w3OL0bIOL0
/O
Instant Messenging
/W 3א'אאL%&א'אא
Internet
(א3א
Integrity Check
(`אiא
IP Address
w&'&$
لאOو/אنI4
IPS
- L 'א$אdIc&?
Junk mail
H/אg6א
Keystroke Logger
yO ]אS-א/`&VZ
Locally
%
אوאאאאدW
אدא
و 114
Look and Feel
سZS)وא/cIא
Malicious content
v3 \
Malware
3אqאא
Man-In-The-Middle
אM
/אV8
Message body
/&א
Mutual Authentication
دل3א6bא
OCR
ً n_@אU4_/א
Online
/W 3 لbOאL%& لbOא
Online trust
%&قאhא
Open Mail Rely
]א%&א)('و6 دمא
Operating System
مאc&
Passive Attack
¾ZمאVCאLSpمאVCא
Password
=و/
א
- 7L "I א. 7? دم-pVM04pא
Pharming
3א4=BאL
Phishing %&('و$" دא#$א
POP3
6א0(
لOو/
Popup
`3Iא- i]bא
Programming Flow
%k/
Regular Expressions
rא-אg3א
Scam
»אع4
115
אوאאאאدW
אدא
و
Search Engines
vi3א-
/
Security Updates
Iא- 6iא
Server
א دم
Smart Card
xאL "3א
SMTP
Z3א6
ل&`אOو/
SMS
+gbLb& =
Social Engineering
4
$אICא
Spywares
NZVאqא/
Strong Authentication
J`א6bא
Subject
/عאn
Text Field
%»b&`S
Tools
+4 Zא-אدوא
Traffic
rא
Two-Factor Authentication
% Iא6bא
Upgrade
L'א-א=א#a
User name
^مZא<א
Version number
^ZI<אL=
Virus
وسgr
Visual Keyboard
/אyO ]אS
Vulnerability
+/h
Web browser
(א3אy]b
אوאאאאدW
אدא
و 116
Webmail (א3אU43א%&א)('و6א
White List
. ,3א` א
Window
+xr &
Worm
+دود
www
(א3א
117
אوאאאאدW
אدא
و
+ا
ا*ــــــــ
• Jonathan B. Postel, "SIMPLE MAIL TRANSFER PROTOCOL", RFC 821,
(http://tools.ietf.org/html/rfc821), August 1982.
• Network Working Group, "Requirements for Internet Hosts -- Application and
Support", RFC 1123, (http://tools.ietf.org/html/rfc1123), May 1996.
• Network Working Group, "Post Office Protocol - Version 3", RFC 1939,
(http://tools.ietf.org/html/rfc1939), May 1996.
• Network Working Group, "MAIL ROUTING AND THE DOMAIN
SYSTEM", RFC 974, (http://tools.ietf.org/html/rfc974) , January 1986.
• Network Working Group, "Common DNS Operational and Configuration
Errors", RFC 1912, (http://tools.ietf.org/html/rfc1912) , February 1996.
7P8،?6د7Zא7/א(אM iL$ א/8א/אdn`<אO? •
אوאאאאدW
אدא
و 118
Certification (GSEC) Practical Assignment, Version 1.4b, Option 1 , SANS
Institute, June 16, 2003K
• “Gmail uses Google's innovative technology to keep spam out of your inbox”,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007K
• ? Nick Johnston, PDF Spam: Spam Evolves, PDF becomes the Latest Threat",
Anti-Spam Development at MessageLabs, A MessageLabs Whitepaper,
August 2007K
• Anti-Spam Research Group (ASRG) of the Internet Research Task Force
(IRTF), (http://asrg.sp.amL).
• Mark Ciampa, “Security + Guide to Network Security Fundamentals”, 2nd
edition, THOMSON, 2005.
• M. Jakobsson, S. Myers, “Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft”, WILEY, 2007.
• R. Lininger, R. Vines, “Phishing: Cutting the Identity Theft Line”, WILEY,
2005.
• L. James, “Phishing Exposed”, SYNGRESS, 2005.
• A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.
EI3אSא.pY
א%&('و$" دא#$= אh]@ دL?و •
77V@אJذ7714w377Zא،6د77Z ضא776/א+776/
،77א77 ،?6د77Zא
13718 אدJم2006/6 I614 J781426
• Christopher Abad, “The economy of phishing: A survey of the operations of
the phishing market”, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S.
Myers, “Phishing and Countermeasures: Understanding the Increasing Problem
of Electronic Identity Theft”, Wiley, 2007.
• The Anti-Phishing Working Group, www.apwg.com.
• Phishing Activity Trends, Report for the Month of November, 2007, Anti-
Phishing Working Group (APWG), apwg.org
• Gartner, Media Relations, 2008 Press Releases, “Gartner Survey Shows
Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These
Attacks”, (http://www.gartner.com/it/page.jsp?id=565125), 05-March-2008.
• Joris Evers, Staff Writer, “PayPal fixes phishing hole”, CNET News.com,
119
אوאאאאدW
אدא
و
(http://www.news.com/PayPal-fixes-phishing-hole/2100-7349_3-
6084974.html) , Published: June 16, 2006 4:12 PM PDT.
• Sebastian Bauer, “Knorr.de SQL Injection and XSS Vulnerabilities”,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQL-
Injection-and-XSS-Vulnerabilities.html) , 01/12/07.
• http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
• Ingrid Marson, “Firefox flaw raises phishing fears”,
(http://www.news.com/Firefox-flaw-raises-phishing-fears/2100-1002_3-
5517149.html), Published: January 7, 2005 11:06 AM PST
• Network Working Group, "Hypertext Transfer Protocol -- HTTP/1.1", RFC
2616, June 1999, (http://tools.ietf.org/html/rfc2616)
• “Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce
Content”, anti-phishing white paper, Microsoft.com,2005