The 5th Conference on Information and Knowledge Technology 2013
DOI: 10.1109/ikt.2013.6620052
|View full text |Cite
|
Sign up to set email alerts
|

An entice resistant automatic phishing detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…A web browser plug-in and a cloud anti-malware suite with its clients installed at the end users are two examples of such applications. For real-time applications, a blacklist approach has shown to be effective in other cybersecurity-related fields (Chen et al, 2014;Kordestani and Shajari, 2013) fields. For further research into phishing NSIFNs and the development of various tools to address networks and the web services they host, security researchers, vendors, and authorities may find the blacklist to be a useful resource.…”
Section: Applications Limitations and Future Workmentioning
confidence: 99%
“…A web browser plug-in and a cloud anti-malware suite with its clients installed at the end users are two examples of such applications. For real-time applications, a blacklist approach has shown to be effective in other cybersecurity-related fields (Chen et al, 2014;Kordestani and Shajari, 2013) fields. For further research into phishing NSIFNs and the development of various tools to address networks and the web services they host, security researchers, vendors, and authorities may find the blacklist to be a useful resource.…”
Section: Applications Limitations and Future Workmentioning
confidence: 99%
“…Examples of such applications are a web browser plug-in and a cloud anti-malware suite with its clients installed at the end users. A blacklist approach has proved to be efficient for real-time applications in other cybersecurity related areas [70,71]. The blacklist can also be a useful resource for security researchers, vendors and authorities for further investigations on the operations of phishing FFSNs.…”
Section: Applications Limitations and Future Workmentioning
confidence: 99%
“…Contrarily, a phish webpage detector was proposed by Li, Xiao, Feng, and Zhao [20] based on visual features and DOM objects of the webpage content that learned and tested over datasets by using Semi-Supervised Machine Learning (TSVM) classifier. Furthermore, Kordestani and Shajari [21] applied three classifiers, including Naïve Bayes (NB), Supervised Machine Learning (SVM), and Random Forest (RF), on a randomly selected dataset to predict phishness in suspected websites. They were deployed for phishness prediction with the presence of URL and online features.…”
Section: B Related Workmentioning
confidence: 99%
“…While, Alexa archive is publicly used to retrieve valid legitimate webpages. We chose such archives because they were commonly used by prior researchers in the literature of phishing detection [15][16][17][18][19][20][21][22][23][24][25][26][27][28]. Fig.…”
Section: A Test-bed and Featuresmentioning
confidence: 99%