Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470111
|View full text |Cite
|
Sign up to set email alerts
|

Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs

Abstract: Current popular phishing prevention techniques mainly utilize reactive blocklists, which leave a "window of opportunity" for attackers during which victims are unprotected. One possible approach to shorten this window aims to detect phishing attacks earlier, during website preparation, by monitoring Certificate Transparency (CT) logs. Previous attempts to work with CT log data for phishing classification exist, however they lack evaluations on actual CT log data. In this paper, we present a pipeline that facil… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The study aims to advance the HS-Decoy and LPC-MTD-based combined model into an international standard-based complex architecture characterized as game theory. Drichel et al in [79] focused on phishing prevention techniques. They proposed a new pipeline that addresses this issue by monitoring Certificate Transparency logs during website preparation.…”
Section: Osint Research Opportunities and Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study aims to advance the HS-Decoy and LPC-MTD-based combined model into an international standard-based complex architecture characterized as game theory. Drichel et al in [79] focused on phishing prevention techniques. They proposed a new pipeline that addresses this issue by monitoring Certificate Transparency logs during website preparation.…”
Section: Osint Research Opportunities and Solutionsmentioning
confidence: 99%
“…Penetration testing automation [66] Characterization and profiling the identified threats [67] Detecting cybersecurity-related Twitter accounts and different sub-groups [70] Compile data regarding the Pulwama attacks [74] Phishing prevention [79] Social Media group solutions. The first group was concerned with detecting and solving cyberspace problems to increase Internet users' security.…”
Section: Recapitulationmentioning
confidence: 99%