Proceedings of the Sixth International Workshop on Security and Privacy Analytics 2020
DOI: 10.1145/3375708.3380313
|View full text |Cite
|
Sign up to set email alerts
|

Diverse Datasets and a Customizable Benchmarking Framework for Phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 13 publications
1
11
0
Order By: Relevance
“…Several recent studies are similar to the research carried out by Priya et al [25], Indrasiri et al [26], Ozcan et al [27], Bu & Kim [28], Zeng et al [29], and el Aassal et al [17], which evaluated the performance of classification techniques and their impact on various datasets. However, these were limited to phishing websites, in contrast to this research, which involved email and website phishing.…”
Section: Related Worksupporting
confidence: 58%
“…Several recent studies are similar to the research carried out by Priya et al [25], Indrasiri et al [26], Ozcan et al [27], Bu & Kim [28], Zeng et al [29], and el Aassal et al [17], which evaluated the performance of classification techniques and their impact on various datasets. However, these were limited to phishing websites, in contrast to this research, which involved email and website phishing.…”
Section: Related Worksupporting
confidence: 58%
“…It mainly affects the solution's performance, and the solution needs to be retrained occasionally to retain its performance [38]. However, retraining is again a challenge in the anti-phishing domain, as collecting a considerable amount of labelled phishing data is difficult in the current context [42], [53]. Furthermore, adversarial attacks are also considered a threat to machine learning-based anti-phishing solutions [42].…”
Section: ) Machine Learning-based Phishing Detectionmentioning
confidence: 99%
“…Further, PhishDet has used adam optimiser with a categorical crossentropy loss function to have the least difference between actual and predicted outputs. A. DATASETS Generally, phishing websites exist only for a limited time on the web [53]. Therefore, it is not easy to construct more reliable datasets for a study if the study depends on URL and HTML content like the current study.…”
Section: Phishdetmentioning
confidence: 99%
See 1 more Smart Citation
“…It is a new dataset with two version available IWSPA v1 [102] and IWSPA v2 [103] [S87] IWSPA-AP [104], [105] Collects and maintain phishing URL data on the internet. S47, S53, S58, [93] S40, S69, S71], S75, S77, S88] OpenPhish [96] Provide an active collection of phishing website URLs [S28, S46, S53, S88] Anti-Phishing Alliance Provides a list of phishing websites in china.…”
Section: Enron Emailmentioning
confidence: 99%