2009
DOI: 10.1007/978-3-642-02617-1_28
|View full text |Cite
|
Sign up to set email alerts
|

Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach

Abstract: Abstract. Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call this kind of countermeasure phishing page polymorphism. Polymorphic pages are visually similar to genuine pages they try to mimic, but they use different representation techniques. It increases the level of difficulty to detect phishing pages. In this paper, we propose an effective detection mech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…The authors use a trained EMD threshold value to differentiate the legitimate and phishing webpages. Lam et al [17] have proposed an image based approach for detecting phishing webpages. The authentic and the suspected pages are transformed into black and white image.…”
Section: Related Workmentioning
confidence: 99%
“…The authors use a trained EMD threshold value to differentiate the legitimate and phishing webpages. Lam et al [17] have proposed an image based approach for detecting phishing webpages. The authentic and the suspected pages are transformed into black and white image.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al applied near duplicate detection to image spam [17]. Mostly, it has been applied in the phishing context though [18,19,20,21]. Medvet et al developed a classifier that identifies phishing pages based on visual text, images contained on the web page as well as a rendering of the web page [20].…”
Section: Related Workmentioning
confidence: 99%
“…Medvet et al developed a classifier that identifies phishing pages based on visual text, images contained on the web page as well as a rendering of the web page [20]. An alternative approach to identify phishing pages focuses on layout similarity [19].…”
Section: Related Workmentioning
confidence: 99%
“…Comparison is performed when the tab is focused again or the page refreshes itself or redirects to a new URL. Lam et al [84] proposed a scheme based on layout similarity analysis instead of HTML or webpage content analysis. The phishing webpages are divided into blocks and are matched to the original pages by image comparison.…”
Section: Multilist Detection Increases Both Computational and Storagementioning
confidence: 99%
“…re-sizing of browser may change the layout drastically, so there will be highfalse positive results; scheme fails if transparent elements are placed on the page that allow user interaction to pass through them. Lam et al [84] Layout similarity technique similar to [82] and [17],but instead of matching CSS layout features, it performs visual matching of the complete webpage .…”
Section: Resistant To Minimal Layout Changes;mentioning
confidence: 99%