2010 eCrime Researchers Summit 2010
DOI: 10.1109/ecrime.2010.5706698
|View full text |Cite
|
Sign up to set email alerts
|

Automatically determining phishing campaigns using the USCAP methodology

Abstract: Phishing fraudsters attempt to create an environment which looks and feels like a legitimate institution, while at the same time attempting to bypass filters and suspicions of their targets. This is a difficult compromise for the phishers and presents a weakness in the process of conducting this fraud. In this research, a methodology is presented that looks at the differences that occur between phishing websites from an authorship analysis perspective and is able to determine different phishing campaigns under… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(26 citation statements)
references
References 25 publications
0
25
1
Order By: Relevance
“…Instead, we must identify when two attacks are likely to be from the same author. This is performed most often as an unsupervised machine-learning task [34]. Methods can be validated on standardised corpora before being applied in an unsupervised setting.…”
Section: Authorship Attributionmentioning
confidence: 99%
“…Instead, we must identify when two attacks are likely to be from the same author. This is performed most often as an unsupervised machine-learning task [34]. Methods can be validated on standardised corpora before being applied in an unsupervised setting.…”
Section: Authorship Attributionmentioning
confidence: 99%
“…Wardman et al examined the file structure and content of suspected phishing web pages to automatically classify reported URLs as phishing [7]. Layton et al cluster phishing web pages together using a combination of k-means and agglomerative clustering [8].…”
Section: Related Workmentioning
confidence: 99%
“…The criminals profit because they can easily replicate content across domains, despite efforts to quickly take down content hosted on compromised websites [1]. Defenders have responded by using machine learning techniques to automatically classify malicious websites [4] and to cluster website copies together [5][6][7][8]. Given the available countermeasures to untargeted large-scale attacks, some cybercriminals have instead focused on creating individualized attacks suited to their target.…”
Section: Introductionmentioning
confidence: 99%
“…Wardman et al examined the file structure and content of suspected phishing webpages to automatically classify reported URLs as phishing [27]. Layton et al cluster phishing webpages together using a combination of k-means and agglomerative clustering [16].…”
Section: Related Workmentioning
confidence: 99%
“…The criminals profit because they can easily replicate content across domains, despite efforts to quickly take down content hosted on compromised websites [20]. Defenders have responded by using machine learning techniques to automatically classify malicious websites [23] and to cluster website copies together [4], [16], [18], [27].…”
Section: Introductionmentioning
confidence: 99%