2011
DOI: 10.1007/978-3-642-20573-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of Phishing Attack Using Dynamic Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Our proposed approach is not dependent on HTTPS protocol and can be used for the websites with both HTTP and HTTPS protocols. Search engines independency: Some previously proposed anti‐phishing methods such as in other works are based on using search engine results. If the attacked website is a newborn website, it usually takes some time for the search engines to add it in their search results, and sometimes, if the web developers do not perform SEO techniques properly, the phishers can develop their fraudulent website with higher ranking results.But our proposed method is independent of search engines and does not consider the rank of the websites in the search engine results. No reliance on user interaction: In some previously proposed anti‐phishing methods such as other works, the users are involved in the anti‐phishing process. Assigning a part of the anti‐phishing process to users can cause detection errors and it is possible for the users to be fooled by the phishers.…”
Section: Analysis Of the Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Our proposed approach is not dependent on HTTPS protocol and can be used for the websites with both HTTP and HTTPS protocols. Search engines independency: Some previously proposed anti‐phishing methods such as in other works are based on using search engine results. If the attacked website is a newborn website, it usually takes some time for the search engines to add it in their search results, and sometimes, if the web developers do not perform SEO techniques properly, the phishers can develop their fraudulent website with higher ranking results.But our proposed method is independent of search engines and does not consider the rank of the websites in the search engine results. No reliance on user interaction: In some previously proposed anti‐phishing methods such as other works, the users are involved in the anti‐phishing process. Assigning a part of the anti‐phishing process to users can cause detection errors and it is possible for the users to be fooled by the phishers.…”
Section: Analysis Of the Proposed Methodsmentioning
confidence: 99%
“…* Other approaches involve users in the anti-phishing process or make them uncomfortable. [25][26][27] Some other methods are dependent to search engines and it is not efficient. 9,10,13,14 On the other hand, relying on online resources, eg, search engines, and context analysis for detecting phishing consumes high amount of network and computation power, respectively.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…This reduces the probability of a user being deceived by an attacker's phishing website. Phishing prevention techniques can be further classified as watermarking based [25], RFID based [26], external authentication devices based [27], picture password based [28], dynamic security skin based [18,29], smart card based [30], and QR Code based techniques [31], and so on. [12].…”
Section: Phishing Prevention Schemesmentioning
confidence: 99%