Proceedings of the Fifth Symposium on Information and Communication Technology - SoICT '14 2014
DOI: 10.1145/2676585.2676596
|View full text |Cite
|
Sign up to set email alerts
|

Detecting phishing web pages based on DOM-tree structure and graph matching algorithm

Abstract: Most modern day phishing attacks occur by luring users into visiting a malicious web page that looks and behaves like the original. Phishing is a web-based attack which end users are lured to visit fraudulent websites and give away personal information unconsciously. The key problem for checking phishing pages is timely and efficiently calculation. There is still remaining a large space for phishing detection methods. In this paper, we present an approach which calculates similarity of two web pages based on g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Lorenz [ 5 ], an extension of the Lorenz system, proposed the first chaotic nonlinear system. The mechanics of liquid flows' calorific convection are simulated using the Lorenz system's messy structure [ 13 ]. Many chaotic and super-chaotic complex systems with nonlinear quadratic conditions have been proposed in [ 13 15 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Lorenz [ 5 ], an extension of the Lorenz system, proposed the first chaotic nonlinear system. The mechanics of liquid flows' calorific convection are simulated using the Lorenz system's messy structure [ 13 ]. Many chaotic and super-chaotic complex systems with nonlinear quadratic conditions have been proposed in [ 13 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…The mechanics of liquid flows' calorific convection are simulated using the Lorenz system's messy structure [ 13 ]. Many chaotic and super-chaotic complex systems with nonlinear quadratic conditions have been proposed in [ 13 15 ]. The Lorenz equation is used to combine these systems with nonlinear quadratic components.…”
Section: Introductionmentioning
confidence: 99%
“…DOMAntiPhish (Rosiello et al, 2007), one such technique, uses the Document Object Model (DOM) similarity between two pages through a defined function in detection. Nguyen et al (2014b) proposed another DOM tree-based approach to overcome the arouse issues in Rosiello's approach through a two-way similarity comparison technique. PhishZoo (Afroz and Greenstadt, 2011), which used a profile based technique with an accuracy of 96.1%, is used URL of the website, SSL certificate, and web content like HTML, images, and scripts.…”
Section: Software-based Detectionmentioning
confidence: 99%