Proceedings 2016 Workshop on Usable Security 2016
DOI: 10.14722/usec.2016.23012
|View full text |Cite
|
Sign up to set email alerts
|

AuntieTuna: Personalized Content-based Phishing Detection

Abstract: Phishing sites masquerade as copies of legitimate sites ("targets") to fool people into sharing sensitive information that can then be used for fraud. Current phishing defenses can be ineffective, with training ignored, blacklists of discovered, bad sites too slow to pick up new threats, and whitelists of knowngood sites too limiting. We have developed a new technique that automatically builds personalized lists of target sites (candidates that may be copied by phish) and then tests sites as a user browses the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…If the number of chunks that matches the hashed blacklist content is greater than a threshold, it flags the webpage as phishing. This method provides good performance and zero false positive rate [7]. However, an attacker can simply use homographs (look-alike characters) or replace the content with images to bypass the detection method [7].…”
Section: Related Work a Mitigating Phishingmentioning
confidence: 99%
See 1 more Smart Citation
“…If the number of chunks that matches the hashed blacklist content is greater than a threshold, it flags the webpage as phishing. This method provides good performance and zero false positive rate [7]. However, an attacker can simply use homographs (look-alike characters) or replace the content with images to bypass the detection method [7].…”
Section: Related Work a Mitigating Phishingmentioning
confidence: 99%
“…This method provides good performance and zero false positive rate [7]. However, an attacker can simply use homographs (look-alike characters) or replace the content with images to bypass the detection method [7].…”
Section: Related Work a Mitigating Phishingmentioning
confidence: 99%
“…(1) Based on type of approach used to mitigate phishing: There are four major approaches to mitigate phishing namely, content-based approaches (Zhang et al, 2007;Wardman and Warner, 2008;Wardman et al, 2011;Afroz and Greenstadt, 2011;Ardi and Heidemann, 2015;Jain and Gupta, 2017), heuristic approaches (Gastellier-Prevost et al, 2011;Nguyen et al, 2013;Rao and Ali, 2015), list-based approaches including black and white lists (Cao et al, 2008a;Sheng et al, , 2009;Prakash et al, , 2010;DNSBL: Spam Database Lookup) and machine learning approaches. Machine learning approaches have congregated wide popularity as they acquire prior knowledge to envisage the manifestations of phishing outbreaks in future.…”
Section: Related Workmentioning
confidence: 99%
“…The researchers in [28] developed an open-source plugin for the Chrome browser which is called AuntieTuna. The novel technique can automatically create personalized lists of candidate sites and check whether the sites are browsed by users.…”
Section: Anti Phishing Techniquementioning
confidence: 99%